<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2025-01-29T14:47:28</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20134235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4235" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036347.html" source="SUSE-SU"/>
    <description>
    shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916845">SUSE bug 916845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009878524" comment="login_defs-4.8.1-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670997" comment="login_defs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009878526" comment="shadow-4.8.1-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166874" comment="shadow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4645</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4645" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4646</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4646" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    (1) unsquash-1.c, (2) unsquash-2.c, (3) unsquash-3.c, and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6798" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036527.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861948" comment="perl-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861949" comment="perl-base-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6913" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1762-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036527.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224040">SUSE bug 1224040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861948" comment="perl-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151455" comment="perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861949" comment="perl-base-5.26.1-150300.17.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151457" comment="perl-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13225</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035929.html" source="SUSE-SU"/>
    <description>
    A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression. Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141157">SUSE bug 1141157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872658" comment="libonig4-6.7.0-150000.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714765" comment="libonig4 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY/#H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803273" comment="libssh2-1-1.11.0-150000.4.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25162</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25162" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: Fix a potential use after free

Free the adap structure only after we are done using it.
This patch just moves the put_device() down a bit to avoid the
use after free.

[wsa: added comment to the code, added Fixes tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035966.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861736" comment="libcairo-gobject2-1.16.0-150400.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158152" comment="libcairo-gobject2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861737" comment="libcairo2-1.16.0-150400.11.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158156" comment="libcairo2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12912" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178760">SUSE bug 1178760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18768</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18768" ref_url="https://www.suse.com/security/cve/CVE-2020-18768" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18768/">CVE-2020-18768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18768">CVE-2020-18768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214574">SUSE bug 1214574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26555</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: avoid a use-after-free when BO init fails

nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm_bo_init() invokes the provided
destructor which should de-initialize and free the memory.

Thus, when nouveau_bo_init() returns an error the gem object has already
been released and the memory freed by nouveau_bo_del_ttm().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8694</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179661">SUSE bug 1179661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816011" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26345</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26345" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33631</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3521" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1557-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1557-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019071.html" source="SUSE-SU"/>
    <description>
    There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature." RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM or public key. It is strongly recommended to only use RPMs and public keys from trusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191175">SUSE bug 1191175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859567" comment="python3-rpm-4.14.3-150400.59.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231456" comment="python3-rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859568" comment="rpm-4.14.3-150400.59.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151943" comment="rpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859569" comment="rpm-ndb-4.14.3-150400.59.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631126" comment="rpm-ndb is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3638</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3638" ref_url="https://www.suse.com/security/cve/CVE-2021-3638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3638/">CVE-2021-3638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3638">CVE-2021-3638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814273" comment="qemu-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814247" comment="qemu-accel-tcg-x86-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814248" comment="qemu-arm-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814274" comment="qemu-audio-spice-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814275" comment="qemu-block-curl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814276" comment="qemu-chardev-spice-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814277" comment="qemu-guest-agent-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814278" comment="qemu-hw-display-qxl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814279" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814280" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814281" comment="qemu-hw-usb-redirect-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814185" comment="qemu-ipxe-1.0.0+-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814260" comment="qemu-s390x-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814193" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814194" comment="qemu-sgabios-8-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814282" comment="qemu-tools-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814283" comment="qemu-ui-opengl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814284" comment="qemu-ui-spice-core-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814203" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814265" comment="qemu-x86-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41072</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41072" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803949" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151752" comment="squashfs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4148</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4204</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4204" ref_url="https://www.suse.com/security/cve/CVE-2021-4204" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4204/">CVE-2021-4204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42327" ref_url="https://www.suse.com/security/cve/CVE-2021-42327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42327/">CVE-2021-42327 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43056</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43527</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
    <description>
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS &lt; 3.73 and NSS &lt; 3.68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193331">SUSE bug 1193331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193378">SUSE bug 1193378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199301">SUSE bug 1199301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225630">SUSE bug 1225630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4439</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4439" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound

The cmtp_add_connection() would add a cmtp session to a controller
and run a kernel thread to process cmtp.

	__module_get(THIS_MODULE);
	session-&gt;task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d",
								session-&gt;num);

During this process, the kernel thread would call detach_capi_ctr()
to detach a register controller. if the controller
was not attached yet, detach_capi_ctr() would
trigger an array-index-out-bounds bug.

[   46.866069][ T6479] UBSAN: array-index-out-of-bounds in
drivers/isdn/capi/kcapi.c:483:21
[   46.867196][ T6479] index -1 is out of range for type 'capi_ctr *[32]'
[   46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted
5.15.0-rc2+ #8
[   46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,
1996), BIOS 1.14.0-2 04/01/2014
[   46.870107][ T6479] Call Trace:
[   46.870473][ T6479]  dump_stack_lvl+0x57/0x7d
[   46.870974][ T6479]  ubsan_epilogue+0x5/0x40
[   46.871458][ T6479]  __ubsan_handle_out_of_bounds.cold+0x43/0x48
[   46.872135][ T6479]  detach_capi_ctr+0x64/0xc0
[   46.872639][ T6479]  cmtp_session+0x5c8/0x5d0
[   46.873131][ T6479]  ? __init_waitqueue_head+0x60/0x60
[   46.873712][ T6479]  ? cmtp_add_msgpart+0x120/0x120
[   46.874256][ T6479]  kthread+0x147/0x170
[   46.874709][ T6479]  ? set_kthread_struct+0x40/0x40
[   46.875248][ T6479]  ret_from_fork+0x1f/0x30
[   46.875773][ T6479]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4441</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()

In zynq_qspi_exec_mem_op(), kzalloc() is directly used in memset(),
which could lead to a NULL pointer dereference on failure of
kzalloc().

Fix this bug by adding a check of tmpbuf.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_SPI_ZYNQ_QSPI=m show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46766" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46766" ref_url="https://www.suse.com/security/cve/CVE-2021-46766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46766/">CVE-2021-46766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46766">CVE-2021-46766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46774</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46774" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46774" ref_url="https://www.suse.com/security/cve/CVE-2021-46774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46774/">CVE-2021-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46774">CVE-2021-46774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/mount_setattr: always cleanup mount_kattr

Make sure that finish_mount_kattr() is called after mount_kattr was
succesfully built in both the success and failure case to prevent
leaking any references we took when we built it.  We returned early if
path lookup failed thereby risking to leak an additional reference we
took when building mount_kattr when an idmapped mount was requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: st21nfca: Fix memory leak in device probe and remove

'phy-&gt;pending_skb' is alloced when device probe, but forgot to free
in the error handling path and remove path, this cause memory leak
as follows:

unreferenced object 0xffff88800bc06800 (size 512):
  comm "8", pid 11775, jiffies 4295159829 (age 9.032s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000d66c09ce&gt;] __kmalloc_node_track_caller+0x1ed/0x450
    [&lt;00000000c93382b3&gt;] kmalloc_reserve+0x37/0xd0
    [&lt;000000005fea522c&gt;] __alloc_skb+0x124/0x380
    [&lt;0000000019f29f9a&gt;] st21nfca_hci_i2c_probe+0x170/0x8f2

Fix it by freeing 'pending_skb' in error and remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46925" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix kernel panic caused by race of smc_sock

A crash occurs when smc_cdc_tx_handler() tries to access smc_sock
but smc_release() has already freed it.

[ 4570.695099] BUG: unable to handle page fault for address: 000000002eae9e88
[ 4570.696048] #PF: supervisor write access in kernel mode
[ 4570.696728] #PF: error_code(0x0002) - not-present page
[ 4570.697401] PGD 0 P4D 0
[ 4570.697716] Oops: 0002 [#1] PREEMPT SMP NOPTI
[ 4570.698228] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.16.0-rc4+ #111
[ 4570.699013] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8c24b4c 04/0
[ 4570.699933] RIP: 0010:_raw_spin_lock+0x1a/0x30
&lt;...&gt;
[ 4570.711446] Call Trace:
[ 4570.711746]  &lt;IRQ&gt;
[ 4570.711992]  smc_cdc_tx_handler+0x41/0xc0
[ 4570.712470]  smc_wr_tx_tasklet_fn+0x213/0x560
[ 4570.712981]  ? smc_cdc_tx_dismisser+0x10/0x10
[ 4570.713489]  tasklet_action_common.isra.17+0x66/0x140
[ 4570.714083]  __do_softirq+0x123/0x2f4
[ 4570.714521]  irq_exit_rcu+0xc4/0xf0
[ 4570.714934]  common_interrupt+0xba/0xe0

Though smc_cdc_tx_handler() checked the existence of smc connection,
smc_release() may have already dismissed and released the smc socket
before smc_cdc_tx_handler() further visits it.

smc_cdc_tx_handler()           |smc_release()
if (!conn)                     |
                               |
                               |smc_cdc_tx_dismiss_slots()
                               |      smc_cdc_tx_dismisser()
                               |
                               |sock_put(&amp;smc-&gt;sk) &lt;- last sock_put,
                               |                      smc_sock freed
bh_lock_sock(&amp;smc-&gt;sk) (panic) |

To make sure we won't receive any CDC messages after we free the
smc_sock, add a refcount on the smc_connection for inflight CDC
message(posted to the QP but haven't received related CQE), and
don't release the smc_connection until all the inflight CDC messages
haven been done, for both success or failed ones.

Using refcount on CDC messages brings another problem: when the link
is going to be destroyed, smcr_link_clear() will reset the QP, which
then remove all the pending CQEs related to the QP in the CQ. To make
sure all the CQEs will always come back so the refcount on the
smc_connection can always reach 0, smc_ib_modify_qp_reset() was replaced
by smc_ib_modify_qp_error().
And remove the timeout in smc_wr_tx_wait_no_pending_sends() since we
need to wait for all pending WQEs done, or we may encounter use-after-
free when handling CQEs.

For IB device removal routine, we need to wait for all the QPs on that
device been destroyed before we can destroy CQs on the device, or
the refcount on smc_connection won't reach 0 and smc_sock cannot be
released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46926</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46926" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: intel-sdw-acpi: harden detection of controller

The existing code currently sets a pointer to an ACPI handle before
checking that it's actually a SoundWire controller. This can lead to
issues where the graph walk continues and eventually fails, but the
pointer was set already.

This patch changes the logic so that the information provided to
the caller is set when a controller is found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46927</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46927" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert

After commit 5b78ed24e8ec ("mm/pagemap: add mmap_assert_locked()
annotations to find_vma*()"), the call to get_user_pages() will trigger
the mmap assert.

static inline void mmap_assert_locked(struct mm_struct *mm)
{
	lockdep_assert_held(&amp;mm-&gt;mmap_lock);
	VM_BUG_ON_MM(!rwsem_is_locked(&amp;mm-&gt;mmap_lock), mm);
}

[   62.521410] kernel BUG at include/linux/mmap_lock.h:156!
...........................................................
[   62.538938] RIP: 0010:find_vma+0x32/0x80
...........................................................
[   62.605889] Call Trace:
[   62.608502]  &lt;TASK&gt;
[   62.610956]  ? lock_timer_base+0x61/0x80
[   62.614106]  find_extend_vma+0x19/0x80
[   62.617195]  __get_user_pages+0x9b/0x6a0
[   62.620356]  __gup_longterm_locked+0x42d/0x450
[   62.623721]  ? finish_wait+0x41/0x80
[   62.626748]  ? __kmalloc+0x178/0x2f0
[   62.629768]  ne_set_user_memory_region_ioctl.isra.0+0x225/0x6a0 [nitro_enclaves]
[   62.635776]  ne_enclave_ioctl+0x1cf/0x6d7 [nitro_enclaves]
[   62.639541]  __x64_sys_ioctl+0x82/0xb0
[   62.642620]  do_syscall_64+0x3b/0x90
[   62.645642]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Use get_user_pages_unlocked() when setting the enclave memory regions.
That's a similar pattern as mmap_read_lock() used together with
get_user_pages().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: use call_rcu to free endpoint

This patch is to delay the endpoint free by calling call_rcu() to fix
another use-after-free issue in sctp_sock_dump():

  BUG: KASAN: use-after-free in __lock_acquire+0x36d9/0x4c20
  Call Trace:
    __lock_acquire+0x36d9/0x4c20 kernel/locking/lockdep.c:3218
    lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3844
    __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
    _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168
    spin_lock_bh include/linux/spinlock.h:334 [inline]
    __lock_sock+0x203/0x350 net/core/sock.c:2253
    lock_sock_nested+0xfe/0x120 net/core/sock.c:2774
    lock_sock include/net/sock.h:1492 [inline]
    sctp_sock_dump+0x122/0xb20 net/sctp/diag.c:324
    sctp_for_each_transport+0x2b5/0x370 net/sctp/socket.c:5091
    sctp_diag_dump+0x3ac/0x660 net/sctp/diag.c:527
    __inet_diag_dump+0xa8/0x140 net/ipv4/inet_diag.c:1049
    inet_diag_dump+0x9b/0x110 net/ipv4/inet_diag.c:1065
    netlink_dump+0x606/0x1080 net/netlink/af_netlink.c:2244
    __netlink_dump_start+0x59a/0x7c0 net/netlink/af_netlink.c:2352
    netlink_dump_start include/linux/netlink.h:216 [inline]
    inet_diag_handler_cmd+0x2ce/0x3f0 net/ipv4/inet_diag.c:1170
    __sock_diag_cmd net/core/sock_diag.c:232 [inline]
    sock_diag_rcv_msg+0x31d/0x410 net/core/sock_diag.c:263
    netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2477
    sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:274

This issue occurs when asoc is peeled off and the old sk is freed after
getting it by asoc-&gt;base.sk and before calling lock_sock(sk).

To prevent the sk free, as a holder of the sk, ep should be alive when
calling lock_sock(). This patch uses call_rcu() and moves sock_put and
ep free into sctp_endpoint_destroy_rcu(), so that it's safe to try to
hold the ep under rcu_read_lock in sctp_transport_traverse_process().

If sctp_endpoint_hold() returns true, it means this ep is still alive
and we have held it and can continue to dump it; If it returns false,
it means this ep is dead and can be freed after rcu_read_unlock, and
we should skip it.

In sctp_sock_dump(), after locking the sk, if this ep is different from
tsp-&gt;asoc-&gt;ep, it means during this dumping, this asoc was peeled off
before calling lock_sock(), and the sk should be skipped; If this ep is
the same with tsp-&gt;asoc-&gt;ep, it means no peeloff happens on this asoc,
and due to lock_sock, no peeloff will happen either until release_sock.

Note that delaying endpoint free won't delay the port release, as the
port release happens in sctp_endpoint_destroy() before calling call_rcu().
Also, freeing endpoint by call_rcu() makes it safe to access the sk by
asoc-&gt;base.sk in sctp_assocs_seq_show() and sctp_rcv().

Thanks Jones to bring this issue up.

v1-&gt;v2:
  - improve the changelog.
  - add kfree(ep) into sctp_endpoint_destroy_rcu(), as Jakub noticed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222400">SUSE bug 1222400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: mtu3: fix list_head check warning

This is caused by uninitialization of list_head.

BUG: KASAN: use-after-free in __list_del_entry_valid+0x34/0xe4

Call trace:
dump_backtrace+0x0/0x298
show_stack+0x24/0x34
dump_stack+0x130/0x1a8
print_address_description+0x88/0x56c
__kasan_report+0x1b8/0x2a0
kasan_report+0x14/0x20
__asan_load8+0x9c/0xa0
__list_del_entry_valid+0x34/0xe4
mtu3_req_complete+0x4c/0x300 [mtu3]
mtu3_gadget_stop+0x168/0x448 [mtu3]
usb_gadget_unregister_driver+0x204/0x3a0
unregister_gadget_item+0x44/0xa4
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Wrap the tx reporter dump callback to extract the sq

Function mlx5e_tx_reporter_dump_sq() casts its void * argument to struct
mlx5e_txqsq *, but in TX-timeout-recovery flow the argument is actually
of type struct mlx5e_tx_timeout_ctx *.

 mlx5_core 0000:08:00.1 enp8s0f1: TX timeout detected
 mlx5_core 0000:08:00.1 enp8s0f1: TX timeout on queue: 1, SQ: 0x11ec, CQ: 0x146d, SQ Cons: 0x0 SQ Prod: 0x1, usecs since last trans: 21565000
 BUG: stack guard page was hit at 0000000093f1a2de (stack is 00000000b66ea0dc..000000004d932dae)
 kernel stack overflow (page fault): 0000 [#1] SMP NOPTI
 CPU: 5 PID: 95 Comm: kworker/u20:1 Tainted: G W OE 5.13.0_mlnx #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Workqueue: mlx5e mlx5e_tx_timeout_work [mlx5_core]
 RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180
 [mlx5_core]
 Call Trace:
 mlx5e_tx_reporter_dump+0x43/0x1c0 [mlx5_core]
 devlink_health_do_dump.part.91+0x71/0xd0
 devlink_health_report+0x157/0x1b0
 mlx5e_reporter_tx_timeout+0xb9/0xf0 [mlx5_core]
 ? mlx5e_tx_reporter_err_cqe_recover+0x1d0/0x1d0
 [mlx5_core]
 ? mlx5e_health_queue_dump+0xd0/0xd0 [mlx5_core]
 ? update_load_avg+0x19b/0x550
 ? set_next_entity+0x72/0x80
 ? pick_next_task_fair+0x227/0x340
 ? finish_task_switch+0xa2/0x280
   mlx5e_tx_timeout_work+0x83/0xb0 [mlx5_core]
   process_one_work+0x1de/0x3a0
   worker_thread+0x2d/0x3c0
 ? process_one_work+0x3a0/0x3a0
   kthread+0x115/0x130
 ? kthread_park+0x90/0x90
   ret_from_fork+0x1f/0x30
 --[ end trace 51ccabea504edaff ]---
 RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180
 PKRU: 55555554
 Kernel panic - not syncing: Fatal exception
 Kernel Offset: disabled
 end Kernel panic - not syncing: Fatal exception

To fix this bug add a wrapper for mlx5e_tx_reporter_dump_sq() which
extracts the sq from struct mlx5e_tx_timeout_ctx and set it as the
TX-timeout-recovery flow dump callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46932" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: appletouch - initialize work before device registration

Syzbot has reported warning in __flush_work(). This warning is caused by
work-&gt;func == NULL, which means missing work initialization.

This may happen, since input_dev-&gt;close() calls
cancel_work_sync(&amp;dev-&gt;work), but dev-&gt;work initalization happens _after_
input_register_device() call.

So this patch moves dev-&gt;work initialization before registering input
device
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46933</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46933" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.

ffs_data_clear is indirectly called from both ffs_fs_kill_sb and
ffs_ep0_release, so it ends up being called twice when userland closes ep0
and then unmounts f_fs.
If userland provided an eventfd along with function's USB descriptors, it
ends up calling eventfd_ctx_put as many times, causing a refcount
underflow.
NULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.

Also, set epfiles to NULL right after de-allocating it, for readability.

For completeness, ffs_data_clear actually ends up being called thrice, the
last call being before the whole ffs structure gets freed, so when this
specific sequence happens there is a second underflow happening (but not
being reported):

/sys/kernel/debug/tracing# modprobe usb_f_fs
/sys/kernel/debug/tracing# echo ffs_data_clear &gt; set_ftrace_filter
/sys/kernel/debug/tracing# echo function &gt; current_tracer
/sys/kernel/debug/tracing# echo 1 &gt; tracing_on
(setup gadget, run and kill function userland process, teardown gadget)
/sys/kernel/debug/tracing# echo 0 &gt; tracing_on
/sys/kernel/debug/tracing# cat trace
 smartcard-openp-436     [000] .....  1946.208786: ffs_data_clear &lt;-ffs_data_closed
 smartcard-openp-431     [000] .....  1946.279147: ffs_data_clear &lt;-ffs_data_closed
 smartcard-openp-431     [000] .n...  1946.905512: ffs_data_clear &lt;-ffs_data_put

Warning output corresponding to above trace:
[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c
[ 1946.293094] refcount_t: underflow; use-after-free.
[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)
[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G         C OE     5.15.0-1-rpi #1  Debian 5.15.3-1
[ 1946.417950] Hardware name: BCM2835
[ 1946.425442] Backtrace:
[ 1946.432048] [&lt;c08d60a0&gt;] (dump_backtrace) from [&lt;c08d62ec&gt;] (show_stack+0x20/0x24)
[ 1946.448226]  r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c
[ 1946.458412] [&lt;c08d62cc&gt;] (show_stack) from [&lt;c08d9ae0&gt;] (dump_stack+0x28/0x30)
[ 1946.470380] [&lt;c08d9ab8&gt;] (dump_stack) from [&lt;c0123500&gt;] (__warn+0xe8/0x154)
[ 1946.482067]  r5:c04a948c r4:c0a71dc8
[ 1946.490184] [&lt;c0123418&gt;] (__warn) from [&lt;c08d6948&gt;] (warn_slowpath_fmt+0xa0/0xe4)
[ 1946.506758]  r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04
[ 1946.517070] [&lt;c08d68ac&gt;] (warn_slowpath_fmt) from [&lt;c04a948c&gt;] (refcount_warn_saturate+0x110/0x15c)
[ 1946.535309]  r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0
[ 1946.546708] [&lt;c04a937c&gt;] (refcount_warn_saturate) from [&lt;c0380134&gt;] (eventfd_ctx_put+0x48/0x74)
[ 1946.564476] [&lt;c03800ec&gt;] (eventfd_ctx_put) from [&lt;bf5464e8&gt;] (ffs_data_clear+0xd0/0x118 [usb_f_fs])
[ 1946.582664]  r5:c3b84c00 r4:c2695b00
[ 1946.590668] [&lt;bf546418&gt;] (ffs_data_clear [usb_f_fs]) from [&lt;bf547cc0&gt;] (ffs_data_closed+0x9c/0x150 [usb_f_fs])
[ 1946.609608]  r5:bf54d014 r4:c2695b00
[ 1946.617522] [&lt;bf547c24&gt;] (ffs_data_closed [usb_f_fs]) from [&lt;bf547da0&gt;] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])
[ 1946.636217]  r7:c0dfcb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: validate user data in compat ioctl

Wrong user data may cause warning in i2c_transfer(), ex: zero msgs.
Userspace should not be able to trigger warnings, so this patch adds
validation checks for user data in compact ioctl to prevent reported
warnings
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46936</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46936" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix use-after-free in tw_timer_handler

A real world panic issue was found as follow in Linux 5.4.

    BUG: unable to handle page fault for address: ffffde49a863de28
    PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0
    RIP: 0010:tw_timer_handler+0x20/0x40
    Call Trace:
     &lt;IRQ&gt;
     call_timer_fn+0x2b/0x120
     run_timer_softirq+0x1ef/0x450
     __do_softirq+0x10d/0x2b8
     irq_exit+0xc7/0xd0
     smp_apic_timer_interrupt+0x68/0x120
     apic_timer_interrupt+0xf/0x20

This issue was also reported since 2017 in the thread [1],
unfortunately, the issue was still can be reproduced after fixing
DCCP.

The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net
namespace is destroyed since tcp_sk_ops is registered befrore
ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops
in the list of pernet_list. There will be a use-after-free on
net-&gt;mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net
if there are some inflight time-wait timers.

This bug is not introduced by commit f2bf415cfed7 ("mib: add net to
NET_ADD_STATS_BH") since the net_statistics is a global variable
instead of dynamic allocation and freeing. Actually, commit
61a7e26028b9 ("mib: put net statistics on struct net") introduces
the bug since it put net statistics on struct net and free it when
net namespace is destroyed.

Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug
and replace pr_crit() with panic() since continuing is meaningless
when init_ipv4_mibs() fails.

[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47047</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47047" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails

The spi controller supports 44-bit address space on AXI in DMA mode,
so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.
In addition, if dma_map_single fails, it should return immediately
instead of continuing doing the DMA operation which bases on invalid
address.

This fixes the following crash which occurs in reading a big block
from flash:

[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)
[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped
[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0
[  123.792536] Mem abort info:
[  123.795313]   ESR = 0x96000145
[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits
[  123.803655]   SET = 0, FnV = 0
[  123.806693]   EA = 0, S1PTW = 0
[  123.809818] Data abort info:
[  123.812683]   ISV = 0, ISS = 0x00000145
[  123.816503]   CM = 1, WnR = 1
[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000
[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000
[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47082</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47082" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: avoid double free in tun_free_netdev

Avoid double free in tun_free_netdev() by moving the
dev-&gt;tstats and tun-&gt;security allocs to a new ndo_init routine
(tun_net_init()) that will be called by register_netdevice().
ndo_init is paired with the desctructor (tun_free_netdev()),
so if there's an error in register_netdevice() the destructor
will handle the frees.

BUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605

CPU: 0 PID: 25750 Comm: syz-executor416 Not tainted 5.16.0-rc2-syzk #1
Hardware name: Red Hat KVM, BIOS
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:247
kasan_report_invalid_free+0x55/0x80 mm/kasan/report.c:372
____kasan_slab_free mm/kasan/common.c:346 [inline]
__kasan_slab_free+0x107/0x120 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:235 [inline]
slab_free_hook mm/slub.c:1723 [inline]
slab_free_freelist_hook mm/slub.c:1749 [inline]
slab_free mm/slub.c:3513 [inline]
kfree+0xac/0x2d0 mm/slub.c:4561
selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605
security_tun_dev_free_security+0x4f/0x90 security/security.c:2342
tun_free_netdev+0xe6/0x150 drivers/net/tun.c:2215
netdev_run_todo+0x4df/0x840 net/core/dev.c:10627
rtnl_unlock+0x13/0x20 net/core/rtnetlink.c:112
__tun_chr_ioctl+0x80c/0x2870 drivers/net/tun.c:3302
tun_chr_ioctl+0x2f/0x40 drivers/net/tun.c:3311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:874 [inline]
__se_sys_ioctl fs/ioctl.c:860 [inline]
__x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47083</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: mediatek: fix global-out-of-bounds issue

When eint virtual eint number is greater than gpio number,
it maybe produce 'desc[eint_n]' size globle-out-of-bounds issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47086</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47086" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47086" ref_url="https://www.suse.com/security/cve/CVE-2021-47086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phonet/pep: refuse to enable an unbound pipe

This ioctl() implicitly assumed that the socket was already bound to
a valid local socket name, i.e. Phonet object. If the socket was not
bound, two separate problems would occur:

1) We'd send an pipe enablement request with an invalid source object.
2) Later socket calls could BUG on the socket unexpectedly being
   connected yet not bound to a valid object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47086/">CVE-2021-47086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47086">CVE-2021-47086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220952">SUSE bug 1220952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47087</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47087" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: optee: Fix incorrect page free bug

Pointer to the allocated pages (struct page *page) has already
progressed towards the end of allocation. It is incorrect to perform
__free_pages(page, order) using this pointer as we would free any
arbitrary pages. Fix this by stop modifying the page pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47089</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47089" ref_url="https://www.suse.com/security/cve/CVE-2021-47089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kfence: fix memory leak when cat kfence objects

Hulk robot reported a kmemleak problem:

    unreferenced object 0xffff93d1d8cc02e8 (size 248):
      comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
      hex dump (first 32 bytes):
        00 40 85 19 d4 93 ff ff 00 10 00 00 00 00 00 00  .@..............
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      backtrace:
         seq_open+0x2a/0x80
         full_proxy_open+0x167/0x1e0
         do_dentry_open+0x1e1/0x3a0
         path_openat+0x961/0xa20
         do_filp_open+0xae/0x120
         do_sys_openat2+0x216/0x2f0
         do_sys_open+0x57/0x80
         do_syscall_64+0x33/0x40
         entry_SYSCALL_64_after_hwframe+0x44/0xa9
    unreferenced object 0xffff93d419854000 (size 4096):
      comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
      hex dump (first 32 bytes):
        6b 66 65 6e 63 65 2d 23 32 35 30 3a 20 30 78 30  kfence-#250: 0x0
        30 30 30 30 30 30 30 37 35 34 62 64 61 31 32 2d  0000000754bda12-
      backtrace:
         seq_read_iter+0x313/0x440
         seq_read+0x14b/0x1a0
         full_proxy_read+0x56/0x80
         vfs_read+0xa5/0x1b0
         ksys_read+0xa0/0xf0
         do_syscall_64+0x33/0x40
         entry_SYSCALL_64_after_hwframe+0x44/0xa9

I find that we can easily reproduce this problem with the following
commands:

	cat /sys/kernel/debug/kfence/objects
	echo scan &gt; /sys/kernel/debug/kmemleak
	cat /sys/kernel/debug/kmemleak

The leaked memory is allocated in the stack below:

    do_syscall_64
      do_sys_open
        do_dentry_open
          full_proxy_open
            seq_open            ---&gt; alloc seq_file
      vfs_read
        full_proxy_read
          seq_read
            seq_read_iter
              traverse          ---&gt; alloc seq_buf

And it should have been released in the following process:

    do_syscall_64
      syscall_exit_to_user_mode
        exit_to_user_mode_prepare
          task_work_run
            ____fput
              __fput
                full_proxy_release  ---&gt; free here

However, the release function corresponding to file_operations is not
implemented in kfence.  As a result, a memory leak occurs.  Therefore,
the solution to this problem is to implement the corresponding release
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47089/">CVE-2021-47089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47089">CVE-2021-47089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220958">SUSE bug 1220958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47091</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix locking in ieee80211_start_ap error path

We need to hold the local-&gt;mtx to release the channel context,
as even encoded by the lockdep_assert_held() there. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47093</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47093" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel_pmc_core: fix memleak on registration failure

In case device registration fails during module initialisation, the
platform device structure needs to be freed using platform_device_put()
to properly free all resources (e.g. the device name).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47094</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47094" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Don't advance iterator after restart due to yielding

After dropping mmu_lock in the TDP MMU, restart the iterator during
tdp_iter_next() and do not advance the iterator.  Advancing the iterator
results in skipping the top-level SPTE and all its children, which is
fatal if any of the skipped SPTEs were not visited before yielding.

When zapping all SPTEs, i.e. when min_level == root_level, restarting the
iter and then invoking tdp_iter_next() is always fatal if the current gfn
has as a valid SPTE, as advancing the iterator results in try_step_side()
skipping the current gfn, which wasn't visited before yielding.

Sprinkle WARNs on iter-&gt;yielded being true in various helpers that are
often used in conjunction with yielding, and tag the helper with
__must_check to reduce the probabily of improper usage.

Failing to zap a top-level SPTE manifests in one of two ways.  If a valid
SPTE is skipped by both kvm_tdp_mmu_zap_all() and kvm_tdp_mmu_put_root(),
the shadow page will be leaked and KVM will WARN accordingly.

  WARNING: CPU: 1 PID: 3509 at arch/x86/kvm/mmu/tdp_mmu.c:46 [kvm]
  RIP: 0010:kvm_mmu_uninit_tdp_mmu+0x3e/0x50 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_destroy_vm+0x130/0x1b0 [kvm]
   kvm_destroy_vm+0x162/0x2a0 [kvm]
   kvm_vcpu_release+0x34/0x60 [kvm]
   __fput+0x82/0x240
   task_work_run+0x5c/0x90
   do_exit+0x364/0xa10
   ? futex_unqueue+0x38/0x60
   do_group_exit+0x33/0xa0
   get_signal+0x155/0x850
   arch_do_signal_or_restart+0xed/0x750
   exit_to_user_mode_prepare+0xc5/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x48/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae

If kvm_tdp_mmu_zap_all() skips a gfn/SPTE but that SPTE is then zapped by
kvm_tdp_mmu_put_root(), KVM triggers a use-after-free in the form of
marking a struct page as dirty/accessed after it has been put back on the
free list.  This directly triggers a WARN due to encountering a page with
page_count() == 0, but it can also lead to data corruption and additional
errors in the kernel.

  WARNING: CPU: 7 PID: 1995658 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:171
  RIP: 0010:kvm_is_zone_device_pfn.part.0+0x9e/0xd0 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_set_pfn_dirty+0x120/0x1d0 [kvm]
   __handle_changed_spte+0x92e/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   zap_gfn_range+0x549/0x620 [kvm]
   kvm_tdp_mmu_put_root+0x1b6/0x270 [kvm]
   mmu_free_root_page+0x219/0x2c0 [kvm]
   kvm_mmu_free_roots+0x1b4/0x4e0 [kvm]
   kvm_mmu_unload+0x1c/0xa0 [kvm]
   kvm_arch_destroy_vm+0x1f2/0x5c0 [kvm]
   kvm_put_kvm+0x3b1/0x8b0 [kvm]
   kvm_vcpu_release+0x4e/0x70 [kvm]
   __fput+0x1f7/0x8c0
   task_work_run+0xf8/0x1a0
   do_exit+0x97b/0x2230
   do_group_exit+0xda/0x2a0
   get_signal+0x3be/0x1e50
   arch_do_signal_or_restart+0x244/0x17f0
   exit_to_user_mode_prepare+0xcb/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x4d/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Note, the underlying bug existed even before commit 1af4a96025b3 ("KVM:
x86/mmu: Yield in TDU MMU iter even if no SPTES changed") moved calls to
tdp_mmu_iter_cond_resched() to the beginning of loops, as KVM could still
incorrectly advance past a top-level entry when yielding on a lower-level
entry.  But with respect to leaking shadow pages, the bug was introduced
by yielding before processing the current gfn.

Alternatively, tdp_mmu_iter_cond_resched() could simply fall through, or
callers could jump to their "retry" label.  The downside of that approach
is that tdp_mmu_iter_cond_resched() _must_ be called before anything else
in the loop, and there's no easy way to enfornce that requirement.

Ideally, KVM would handling the cond_resched() fully within the iterator
macro (the code is actually quite clean) and avoid this entire class of
bugs, but that is extremely difficult do wh
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222401">SUSE bug 1222401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47095" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: ssif: initialize ssif_info-&gt;client early

During probe ssif_info-&gt;client is dereferenced in error path. However,
it is set when some of the error checking has already been done. This
causes following kernel crash if an error path is taken:

[   30.645593][  T674] ipmi_ssif 0-000e: ipmi_ssif: Not probing, Interface already present
[   30.657616][  T674] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000088
...
[   30.657723][  T674] pc : __dev_printk+0x28/0xa0
[   30.657732][  T674] lr : _dev_err+0x7c/0xa0
...
[   30.657772][  T674] Call trace:
[   30.657775][  T674]  __dev_printk+0x28/0xa0
[   30.657778][  T674]  _dev_err+0x7c/0xa0
[   30.657781][  T674]  ssif_probe+0x548/0x900 [ipmi_ssif 62ce4b08badc1458fd896206d9ef69a3c31f3d3e]
[   30.657791][  T674]  i2c_device_probe+0x37c/0x3c0
...

Initialize ssif_info-&gt;client before any error path can be taken. Clear
i2c_client data in the error path to prevent the dangling pointer from
leaking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47096</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47096" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: rawmidi - fix the uninitalized user_pversion

The user_pversion was uninitialized for the user space file structure
in the open function, because the file private structure use
kmalloc for the allocation.

The kernel ALSA sequencer code clears the file structure, so no additional
fixes are required.

BugLink: https://github.com/alsa-project/alsa-lib/issues/178
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47097</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47097" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: elantech - fix stack out of bound access in elantech_change_report_id()

The array param[] in elantech_change_report_id() must be at least 3
bytes, because elantech_read_reg_params() is calling ps2_command() with
PSMOUSE_CMD_GETINFO, that is going to access 3 bytes from param[], but
it's defined in the stack as an array of 2 bytes, therefore we have a
potential stack out-of-bounds access here, also confirmed by KASAN:

[    6.512374] BUG: KASAN: stack-out-of-bounds in __ps2_command+0x372/0x7e0
[    6.512397] Read of size 1 at addr ffff8881024d77c2 by task kworker/2:1/118

[    6.512416] CPU: 2 PID: 118 Comm: kworker/2:1 Not tainted 5.13.0-22-generic #22+arighi20211110
[    6.512428] Hardware name: LENOVO 20T8000QGE/20T8000QGE, BIOS R1AET32W (1.08 ) 08/14/2020
[    6.512436] Workqueue: events_long serio_handle_event
[    6.512453] Call Trace:
[    6.512462]  show_stack+0x52/0x58
[    6.512474]  dump_stack+0xa1/0xd3
[    6.512487]  print_address_description.constprop.0+0x1d/0x140
[    6.512502]  ? __ps2_command+0x372/0x7e0
[    6.512516]  __kasan_report.cold+0x7d/0x112
[    6.512527]  ? _raw_write_lock_irq+0x20/0xd0
[    6.512539]  ? __ps2_command+0x372/0x7e0
[    6.512552]  kasan_report+0x3c/0x50
[    6.512564]  __asan_load1+0x6a/0x70
[    6.512575]  __ps2_command+0x372/0x7e0
[    6.512589]  ? ps2_drain+0x240/0x240
[    6.512601]  ? dev_printk_emit+0xa2/0xd3
[    6.512612]  ? dev_vprintk_emit+0xc5/0xc5
[    6.512621]  ? __kasan_check_write+0x14/0x20
[    6.512634]  ? mutex_lock+0x8f/0xe0
[    6.512643]  ? __mutex_lock_slowpath+0x20/0x20
[    6.512655]  ps2_command+0x52/0x90
[    6.512670]  elantech_ps2_command+0x4f/0xc0 [psmouse]
[    6.512734]  elantech_change_report_id+0x1e6/0x256 [psmouse]
[    6.512799]  ? elantech_report_trackpoint.constprop.0.cold+0xd/0xd [psmouse]
[    6.512863]  ? ps2_command+0x7f/0x90
[    6.512877]  elantech_query_info.cold+0x6bd/0x9ed [psmouse]
[    6.512943]  ? elantech_setup_ps2+0x460/0x460 [psmouse]
[    6.513005]  ? psmouse_reset+0x69/0xb0 [psmouse]
[    6.513064]  ? psmouse_attr_set_helper+0x2a0/0x2a0 [psmouse]
[    6.513122]  ? phys_pmd_init+0x30e/0x521
[    6.513137]  elantech_init+0x8a/0x200 [psmouse]
[    6.513200]  ? elantech_init_ps2+0xf0/0xf0 [psmouse]
[    6.513249]  ? elantech_query_info+0x440/0x440 [psmouse]
[    6.513296]  ? synaptics_send_cmd+0x60/0x60 [psmouse]
[    6.513342]  ? elantech_query_info+0x440/0x440 [psmouse]
[    6.513388]  ? psmouse_try_protocol+0x11e/0x170 [psmouse]
[    6.513432]  psmouse_extensions+0x65d/0x6e0 [psmouse]
[    6.513476]  ? psmouse_try_protocol+0x170/0x170 [psmouse]
[    6.513519]  ? mutex_unlock+0x22/0x40
[    6.513526]  ? ps2_command+0x7f/0x90
[    6.513536]  ? psmouse_probe+0xa3/0xf0 [psmouse]
[    6.513580]  psmouse_switch_protocol+0x27d/0x2e0 [psmouse]
[    6.513624]  psmouse_connect+0x272/0x530 [psmouse]
[    6.513669]  serio_driver_probe+0x55/0x70
[    6.513679]  really_probe+0x190/0x720
[    6.513689]  driver_probe_device+0x160/0x1f0
[    6.513697]  device_driver_attach+0x119/0x130
[    6.513705]  ? device_driver_attach+0x130/0x130
[    6.513713]  __driver_attach+0xe7/0x1a0
[    6.513720]  ? device_driver_attach+0x130/0x130
[    6.513728]  bus_for_each_dev+0xfb/0x150
[    6.513738]  ? subsys_dev_iter_exit+0x10/0x10
[    6.513748]  ? _raw_write_unlock_bh+0x30/0x30
[    6.513757]  driver_attach+0x2d/0x40
[    6.513764]  serio_handle_event+0x199/0x3d0
[    6.513775]  process_one_work+0x471/0x740
[    6.513785]  worker_thread+0x2d2/0x790
[    6.513794]  ? process_one_work+0x740/0x740
[    6.513802]  kthread+0x1b4/0x1e0
[    6.513809]  ? set_kthread_struct+0x80/0x80
[    6.513816]  ret_from_fork+0x22/0x30

[    6.513832] The buggy address belongs to the page:
[    6.513838] page:00000000bc35e189 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d7
[    6.513847] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)
[    6.513860] raw: 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47098</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47098" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations

Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of
temperature calculations") addressed a number of underflow situations
when writing temperature limits. However, it missed one situation, seen
when an attempt is made to set the hysteresis value to MAX_LONG and the
critical temperature limit is negative.

Use clamp_val() when setting the hysteresis temperature to ensure that
the provided value can never overflow or underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47099</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47099" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: ensure skb entering GRO are not cloned.

After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"),
if GRO is enabled on a veth device and TSO is disabled on the peer
device, TCP skbs will go through the NAPI callback. If there is no XDP
program attached, the veth code does not perform any share check, and
shared/cloned skbs could enter the GRO engine.

Ignat reported a BUG triggered later-on due to the above condition:

[   53.970529][    C1] kernel BUG at net/core/skbuff.c:3574!
[   53.981755][    C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
[   53.982634][    C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25
[   53.982634][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[   53.982634][    C1] RIP: 0010:skb_shift+0x13ef/0x23b0
[   53.982634][    C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0
7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f
85 74 f5 ff ff &lt;0f&gt; 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89
f7 4c 89 8c
[   53.982634][    C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246
[   53.982634][    C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000
[   53.982634][    C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2
[   53.982634][    C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0
[   53.982634][    C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590
[   53.982634][    C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0
[   53.982634][    C1] FS:  0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000
[   53.982634][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   53.982634][    C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0
[   53.982634][    C1] Call Trace:
[   53.982634][    C1]  &lt;TASK&gt;
[   53.982634][    C1]  tcp_sacktag_walk+0xaba/0x18e0
[   53.982634][    C1]  tcp_sacktag_write_queue+0xe7b/0x3460
[   53.982634][    C1]  tcp_ack+0x2666/0x54b0
[   53.982634][    C1]  tcp_rcv_established+0x4d9/0x20f0
[   53.982634][    C1]  tcp_v4_do_rcv+0x551/0x810
[   53.982634][    C1]  tcp_v4_rcv+0x22ed/0x2ed0
[   53.982634][    C1]  ip_protocol_deliver_rcu+0x96/0xaf0
[   53.982634][    C1]  ip_local_deliver_finish+0x1e0/0x2f0
[   53.982634][    C1]  ip_sublist_rcv_finish+0x211/0x440
[   53.982634][    C1]  ip_list_rcv_finish.constprop.0+0x424/0x660
[   53.982634][    C1]  ip_list_rcv+0x2c8/0x410
[   53.982634][    C1]  __netif_receive_skb_list_core+0x65c/0x910
[   53.982634][    C1]  netif_receive_skb_list_internal+0x5f9/0xcb0
[   53.982634][    C1]  napi_complete_done+0x188/0x6e0
[   53.982634][    C1]  gro_cell_poll+0x10c/0x1d0
[   53.982634][    C1]  __napi_poll+0xa1/0x530
[   53.982634][    C1]  net_rx_action+0x567/0x1270
[   53.982634][    C1]  __do_softirq+0x28a/0x9ba
[   53.982634][    C1]  run_ksoftirqd+0x32/0x60
[   53.982634][    C1]  smpboot_thread_fn+0x559/0x8c0
[   53.982634][    C1]  kthread+0x3b9/0x490
[   53.982634][    C1]  ret_from_fork+0x22/0x30
[   53.982634][    C1]  &lt;/TASK&gt;

Address the issue by skipping the GRO stage for shared or cloned skbs.
To reduce the chance of OoO, try to unclone the skbs before giving up.

v1 -&gt; v2:
 - use avoid skb_copy and fallback to netif_receive_skb  - Eric
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47100</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module

Hi,

When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko,
the system crashed.

The log as follows:
[  141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a
[  141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0
[  141.087464] Oops: 0010 [#1] SMP NOPTI
[  141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47
[  141.088009] Workqueue: events 0xffffffffc09b3a40
[  141.088009] RIP: 0010:0xffffffffc09b3a5a
[  141.088009] Code: Bad RIP value.
[  141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246
[  141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000
[  141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[  141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1
[  141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700
[  141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8
[  141.088009] FS:  0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000
[  141.088009] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0
[  141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  141.088009] PKRU: 55555554
[  141.088009] Call Trace:
[  141.088009]  ? process_one_work+0x195/0x390
[  141.088009]  ? worker_thread+0x30/0x390
[  141.088009]  ? process_one_work+0x390/0x390
[  141.088009]  ? kthread+0x10d/0x130
[  141.088009]  ? kthread_flush_work_fn+0x10/0x10
[  141.088009]  ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a
[  200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0
[  200.223464] Oops: 0010 [#1] SMP NOPTI
[  200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46
[  200.224008] Workqueue: events 0xffffffffc0b28a40
[  200.224008] RIP: 0010:0xffffffffc0b28a5a
[  200.224008] Code: Bad RIP value.
[  200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246
[  200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000
[  200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[  200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5
[  200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700
[  200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8
[  200.224008] FS:  0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000
[  200.224008] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0
[  200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  200.224008] PKRU: 55555554
[  200.224008] Call Trace:
[  200.224008]  ? process_one_work+0x195/0x390
[  200.224008]  ? worker_thread+0x30/0x390
[  200.224008]  ? process_one_work+0x390/0x390
[  200.224008]  ? kthread+0x10d/0x130
[  200.224008]  ? kthread_flush_work_fn+0x10/0x10
[  200.224008]  ? ret_from_fork+0x35/0x40
[  200.224008] kernel fault(0x1) notification starting on CPU 63
[  200.224008] kernel fault(0x1) notification finished on CPU 63
[  200.224008] CR2: ffffffffc0b28a5a
[  200.224008] ---[ end trace c82a412d93f57412 ]---

The reason is as follows:
T1: rmmod ipmi_si.
    -&gt;ipmi_unregister_smi()
        -&gt; ipmi_bmc_unregister()
            -&gt; __ipmi_bmc_unregister()
                -&gt; kref_put(&amp;bmc-&gt;usecount, cleanup_bmc_device);
                    -&gt; schedule_work(&amp;bmc-&gt;remove_work);

T2: rmmod ipmi_msghandl
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47101</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

asix: fix uninit-value in asix_mdio_read()

asix_read_cmd() may read less than sizeof(smsr) bytes and in this case
smsr will be uninitialized.

Fail log:
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
BUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
 asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47102</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47102" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix incorrect structure access

In line:
	upper = info-&gt;upper_dev;
We access upper_dev field, which is related only for particular events
(e.g. event == NETDEV_CHANGEUPPER). So, this line cause invalid memory
access for another events,
when ptr is not netdev_notifier_changeupper_info.

The KASAN logs are as follows:

[   30.123165] BUG: KASAN: stack-out-of-bounds in prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]
[   30.133336] Read of size 8 at addr ffff80000cf772b0 by task udevd/778
[   30.139866]
[   30.141398] CPU: 0 PID: 778 Comm: udevd Not tainted 5.16.0-rc3 #6
[   30.147588] Hardware name: DNI AmazonGo1 A7040 board (DT)
[   30.153056] Call trace:
[   30.155547]  dump_backtrace+0x0/0x2c0
[   30.159320]  show_stack+0x18/0x30
[   30.162729]  dump_stack_lvl+0x68/0x84
[   30.166491]  print_address_description.constprop.0+0x74/0x2b8
[   30.172346]  kasan_report+0x1e8/0x250
[   30.176102]  __asan_load8+0x98/0xe0
[   30.179682]  prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]
[   30.186847]  prestera_netdev_event_handler+0x1b4/0x1c0 [prestera]
[   30.193313]  raw_notifier_call_chain+0x74/0xa0
[   30.197860]  call_netdevice_notifiers_info+0x68/0xc0
[   30.202924]  register_netdevice+0x3cc/0x760
[   30.207190]  register_netdev+0x24/0x50
[   30.211015]  prestera_device_register+0x8a0/0xba0 [prestera]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47103</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: fully convert sk-&gt;sk_rx_dst to RCU rules

syzbot reported various issues around early demux,
one being included in this changelog [1]

sk-&gt;sk_rx_dst is using RCU protection without clearly
documenting it.

And following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv()
are not following standard RCU rules.

[a]    dst_release(dst);
[b]    sk-&gt;sk_rx_dst = NULL;

They look wrong because a delete operation of RCU protected
pointer is supposed to clear the pointer before
the call_rcu()/synchronize_rcu() guarding actual memory freeing.

In some cases indeed, dst could be freed before [b] is done.

We could cheat by clearing sk_rx_dst before calling
dst_release(), but this seems the right time to stick
to standard RCU annotations and debugging facilities.

[1]
BUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline]
BUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792
Read of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204

CPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
 dst_check include/net/dst.h:470 [inline]
 tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792
 ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340
 ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583
 ip_sublist_rcv net/ipv4/ip_input.c:609 [inline]
 ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644
 __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline]
 __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556
 __netif_receive_skb_list net/core/dev.c:5608 [inline]
 netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699
 gro_normal_list net/core/dev.c:5853 [inline]
 gro_normal_list net/core/dev.c:5849 [inline]
 napi_complete_done+0x1f1/0x880 net/core/dev.c:6590
 virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline]
 virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557
 __napi_poll+0xaf/0x440 net/core/dev.c:7023
 napi_poll net/core/dev.c:7090 [inline]
 net_rx_action+0x801/0xb40 net/core/dev.c:7177
 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558
 invoke_softirq kernel/softirq.c:432 [inline]
 __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
 common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240
 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629
RIP: 0033:0x7f5e972bfd57
Code: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e &lt;48&gt; 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73
RSP: 002b:00007fff8a413210 EFLAGS: 00000283
RAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45
RDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45
RBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9
R10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0
R13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019
 &lt;/TASK&gt;

Allocated by task 13:
 kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:46 [inline]
 set_alloc_info mm/kasan/common.c:434 [inline]
 __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467
 kasan_slab_alloc include/linux/kasan.h:259 [inline]
 slab_post_alloc_hook mm/slab.h:519 [inline]
 slab_alloc_node mm/slub.c:3234 [inline]
 slab_alloc mm/slub.c:3242 [inline]
 kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247
 dst_alloc+0x146/0x1f0 net/core/dst.c:92
 rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613
 ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221010">SUSE bug 1221010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47104</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()

The wrong goto label was used for the error case and missed cleanup of the
pkt allocation.

Addresses-Coverity-ID: 1493352 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47105</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47105" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: xsk: return xsk buffers back to pool when cleaning the ring

Currently we only NULL the xdp_buff pointer in the internal SW ring but
we never give it back to the xsk buffer pool. This means that buffers
can be leaked out of the buff pool and never be used again.

Add missing xsk_buff_free() call to the routine that is supposed to
clean the entries that are left in the ring so that these buffers in the
umem can be used by other sockets.

Also, only go through the space that is actually left to be cleaned
instead of a whole ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47106</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47106" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47106" ref_url="https://www.suse.com/security/cve/CVE-2021-47106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()

We need to use list_for_each_entry_safe() iterator
because we can not access @catchall after kfree_rcu() call.

syzbot reported:

BUG: KASAN: use-after-free in nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]
BUG: KASAN: use-after-free in nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]
BUG: KASAN: use-after-free in nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493
Read of size 8 at addr ffff8880716e5b80 by task syz-executor.3/8871

CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x2ed mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
 nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]
 nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]
 nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493
 __nft_release_table+0x79f/0xcd0 net/netfilter/nf_tables_api.c:9626
 nft_rcv_nl_event+0x4f8/0x670 net/netfilter/nf_tables_api.c:9688
 notifier_call_chain+0xb5/0x200 kernel/notifier.c:83
 blocking_notifier_call_chain kernel/notifier.c:318 [inline]
 blocking_notifier_call_chain+0x67/0x90 kernel/notifier.c:306
 netlink_release+0xcb6/0x1dd0 net/netlink/af_netlink.c:788
 __sock_release+0xcd/0x280 net/socket.c:649
 sock_close+0x18/0x20 net/socket.c:1314
 __fput+0x286/0x9f0 fs/file_table.c:280
 task_work_run+0xdd/0x1a0 kernel/task_work.c:164
 tracehook_notify_resume include/linux/tracehook.h:189 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
 exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207
 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
 syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f75fbf28adb
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffd8da7ec10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f75fbf28adb
RDX: 00007f75fc08e828 RSI: ffffffffffffffff RDI: 0000000000000003
RBP: 00007f75fc08a960 R08: 0000000000000000 R09: 00007f75fc08e830
R10: 00007ffd8da7ed10 R11: 0000000000000293 R12: 00000000002067c3
R13: 00007ffd8da7ed10 R14: 00007f75fc088f60 R15: 0000000000000032
 &lt;/TASK&gt;

Allocated by task 8886:
 kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:46 [inline]
 set_alloc_info mm/kasan/common.c:434 [inline]
 ____kasan_kmalloc mm/kasan/common.c:513 [inline]
 ____kasan_kmalloc mm/kasan/common.c:472 [inline]
 __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:522
 kasan_kmalloc include/linux/kasan.h:269 [inline]
 kmem_cache_alloc_trace+0x1ea/0x4a0 mm/slab.c:3575
 kmalloc include/linux/slab.h:590 [inline]
 nft_setelem_catchall_insert net/netfilter/nf_tables_api.c:5544 [inline]
 nft_setelem_insert net/netfilter/nf_tables_api.c:5562 [inline]
 nft_add_set_elem+0x232e/0x2f40 net/netfilter/nf_tables_api.c:5936
 nf_tables_newsetelem+0x6ff/0xbb0 net/netfilter/nf_tables_api.c:6032
 nfnetlink_rcv_batch+0x1710/0x25f0 net/netfilter/nfnetlink.c:513
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline]
 nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:652
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47106/">CVE-2021-47106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47106">CVE-2021-47106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220962">SUSE bug 1220962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47107</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47107" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix READDIR buffer overflow

If a client sends a READDIR count argument that is too small (say,
zero), then the buffer size calculation in the new init_dirlist
helper functions results in an underflow, allowing the XDR stream
functions to write beyond the actual buffer.

This calculation has always been suspect. NFSD has never sanity-
checked the READDIR count argument, but the old entry encoders
managed the problem correctly.

With the commits below, entry encoding changed, exposing the
underflow to the pointer arithmetic in xdr_reserve_space().

Modern NFS clients attempt to retrieve as much data as possible
for each READDIR request. Also, we have no unit tests that
exercise the behavior of READDIR at the lower bound of @count
values. Thus this case was missed during testing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47108</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47108" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf

In commit 41ca9caaae0b
("drm/mediatek: hdmi: Add check for CEA modes only") a check
for CEA modes was added to function mtk_hdmi_bridge_mode_valid()
in order to address possible issues on MT8167;
moreover, with commit c91026a938c2
("drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock")
another similar check was introduced.

Unfortunately though, at the time of writing, MT8173 does not provide
any mtk_hdmi_conf structure and this is crashing the kernel with NULL
pointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as
soon as a HDMI cable gets plugged in.

To fix this regression, add a NULL pointer check for hdmi-&gt;conf in the
said function, restoring HDMI functionality and avoiding NULL pointer
kernel panics.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47181</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: tusb6010: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47182</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix scsi_mode_sense() buffer length handling

Several problems exist with scsi_mode_sense() buffer length handling:

 1) The allocation length field of the MODE SENSE(10) command is 16-bits,
    occupying bytes 7 and 8 of the CDB. With this command, access to mode
    pages larger than 255 bytes is thus possible. However, the CDB
    allocation length field is set by assigning len to byte 8 only, thus
    truncating buffer length larger than 255.

 2) If scsi_mode_sense() is called with len smaller than 8 with
    sdev-&gt;use_10_for_ms set, or smaller than 4 otherwise, the buffer length
    is increased to 8 and 4 respectively, and the buffer is zero filled
    with these increased values, thus corrupting the memory following the
    buffer.

Fix these 2 problems by using put_unaligned_be16() to set the allocation
length field of MODE SENSE(10) CDB and by returning an error when len is
too small.

Furthermore, if len is larger than 255B, always try MODE SENSE(10) first,
even if the device driver did not set sdev-&gt;use_10_for_ms. In case of
invalid opcode error for MODE SENSE(10), access to mode pages larger than
255 bytes are not retried using MODE SENSE(6). To avoid buffer length
overflows for the MODE_SENSE(10) case, check that len is smaller than 65535
bytes.

While at it, also fix the folowing:

 * Use get_unaligned_be16() to retrieve the mode data length and block
   descriptor length fields of the mode sense reply header instead of using
   an open coded calculation.

 * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable
   Block Descriptor, which is the opposite of what the dbd argument
   description was.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47183</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix link down processing to address NULL pointer dereference

If an FC link down transition while PLOGIs are outstanding to fabric well
known addresses, outstanding ABTS requests may result in a NULL pointer
dereference. Driver unload requests may hang with repeated "2878" log
messages.

The Link down processing results in ABTS requests for outstanding ELS
requests. The Abort WQEs are sent for the ELSs before the driver had set
the link state to down. Thus the driver is sending the Abort with the
expectation that an ABTS will be sent on the wire. The Abort request is
stalled waiting for the link to come up. In some conditions the driver may
auto-complete the ELSs thus if the link does come up, the Abort completions
may reference an invalid structure.

Fix by ensuring that Abort set the flag to avoid link traffic if issued due
to conditions where the link failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47184</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47184" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL ptr dereference on VSI filter sync

Remove the reason of null pointer dereference in sync VSI filters.
Added new I40E_VSI_RELEASING flag to signalize deleting and releasing
of VSI resources to sync this thread with sync filters subtask.
Without this patch it is possible to start update the VSI filter list
after VSI is removed, that's causing a kernel oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47185</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc

When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,
which look like this one:

  Workqueue: events_unbound flush_to_ldisc
  Call trace:
   dump_backtrace+0x0/0x1ec
   show_stack+0x24/0x30
   dump_stack+0xd0/0x128
   panic+0x15c/0x374
   watchdog_timer_fn+0x2b8/0x304
   __run_hrtimer+0x88/0x2c0
   __hrtimer_run_queues+0xa4/0x120
   hrtimer_interrupt+0xfc/0x270
   arch_timer_handler_phys+0x40/0x50
   handle_percpu_devid_irq+0x94/0x220
   __handle_domain_irq+0x88/0xf0
   gic_handle_irq+0x84/0xfc
   el1_irq+0xc8/0x180
   slip_unesc+0x80/0x214 [slip]
   tty_ldisc_receive_buf+0x64/0x80
   tty_port_default_receive_buf+0x50/0x90
   flush_to_ldisc+0xbc/0x110
   process_one_work+0x1d4/0x4b0
   worker_thread+0x180/0x430
   kthread+0x11c/0x120

In the testcase pty04, The first process call the write syscall to send
data to the pty master. At the same time, the workqueue will do the
flush_to_ldisc to pop data in a loop until there is no more data left.
When the sender and workqueue running in different core, the sender sends
data fastly in full time which will result in workqueue doing work in loop
for a long time and occuring softlockup in flush_to_ldisc with kernel
configured without preempt. So I add need_resched check and cond_resched
in the flush_to_ldisc loop to avoid it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47186</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47186" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47186" ref_url="https://www.suse.com/security/cve/CVE-2021-47186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: check for null after calling kmemdup

kmemdup can return a null pointer so need to check for it, otherwise
the null key will be dereferenced later in tipc_crypto_key_xmit as
can be seen in the trace [1].


[1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47186/">CVE-2021-47186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47186">CVE-2021-47186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222702">SUSE bug 1222702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47187</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency

The entry/exit latency and minimum residency in state for the idle
states of MSM8998 were ..bad: first of all, for all of them the
timings were written for CPU sleep but the min-residency-us param
was miscalculated (supposedly, while porting this from downstream);
Then, the power collapse states are setting PC on both the CPU
cluster *and* the L2 cache, which have different timings: in the
specific case of L2 the times are higher so these ones should be
taken into account instead of the CPU ones.

This parameter misconfiguration was not giving particular issues
because on MSM8998 there was no CPU scaling at all, so cluster/L2
power collapse was rarely (if ever) hit.
When CPU scaling is enabled, though, the wrong timings will produce
SoC unstability shown to the user as random, apparently error-less,
sudden reboots and/or lockups.

This set of parameters are stabilizing the SoC when CPU scaling is
ON and when power collapse is frequently hit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47188</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Improve SCSI abort handling

The following has been observed on a test setup:

WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c
Call trace:
 ufshcd_queuecommand+0x468/0x65c
 scsi_send_eh_cmnd+0x224/0x6a0
 scsi_eh_test_devices+0x248/0x418
 scsi_eh_ready_devs+0xc34/0xe58
 scsi_error_handler+0x204/0x80c
 kthread+0x150/0x1b4
 ret_from_fork+0x10/0x30

That warning is triggered by the following statement:

	WARN_ON(lrbp-&gt;cmd);

Fix this warning by clearing lrbp-&gt;cmd from the abort handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47189</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory ordering between normal and ordered work functions

Ordered work functions aren't guaranteed to be handled by the same thread
which executed the normal work functions. The only way execution between
normal/ordered functions is synchronized is via the WORK_DONE_BIT,
unfortunately the used bitops don't guarantee any ordering whatsoever.

This manifested as seemingly inexplicable crashes on ARM64, where
async_chunk::inode is seen as non-null in async_cow_submit which causes
submit_compressed_extents to be called and crash occurs because
async_chunk::inode suddenly became NULL. The call trace was similar to:

    pc : submit_compressed_extents+0x38/0x3d0
    lr : async_cow_submit+0x50/0xd0
    sp : ffff800015d4bc20

    &lt;registers omitted for brevity&gt;

    Call trace:
     submit_compressed_extents+0x38/0x3d0
     async_cow_submit+0x50/0xd0
     run_ordered_work+0xc8/0x280
     btrfs_work_helper+0x98/0x250
     process_one_work+0x1f0/0x4ac
     worker_thread+0x188/0x504
     kthread+0x110/0x114
     ret_from_fork+0x10/0x18

Fix this by adding respective barrier calls which ensure that all
accesses preceding setting of WORK_DONE_BIT are strictly ordered before
setting the flag. At the same time add a read barrier after reading of
WORK_DONE_BIT in run_ordered_work which ensures all subsequent loads
would be strictly ordered after reading the bit. This in turn ensures
are all accesses before WORK_DONE_BIT are going to be strictly ordered
before any access that can occur in ordered_func.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47191</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()

The following warning was observed running syzkaller:

[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;
[ 3813.830724]    program syz-executor not setting count and/or reply_len properly
[ 3813.836956] ==================================================================
[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0
[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549
[ 3813.846612] Call Trace:
[ 3813.846995]  dump_stack+0x108/0x15f
[ 3813.847524]  print_address_description+0xa5/0x372
[ 3813.848243]  kasan_report.cold+0x236/0x2a8
[ 3813.849439]  check_memory_region+0x240/0x270
[ 3813.850094]  memcpy+0x30/0x80
[ 3813.850553]  sg_copy_buffer+0x157/0x1e0
[ 3813.853032]  sg_copy_from_buffer+0x13/0x20
[ 3813.853660]  fill_from_dev_buffer+0x135/0x370
[ 3813.854329]  resp_readcap16+0x1ac/0x280
[ 3813.856917]  schedule_resp+0x41f/0x1630
[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0
[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950
[ 3813.863329]  scsi_request_fn+0xd8e/0x1710
[ 3813.863946]  __blk_run_queue+0x10b/0x230
[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400
[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420
[ 3813.871637]  sg_write+0x6c8/0xef0
[ 3813.878853]  __vfs_write+0xe4/0x800
[ 3813.883487]  vfs_write+0x17b/0x530
[ 3813.884008]  ksys_write+0x103/0x270
[ 3813.886268]  __x64_sys_write+0x77/0xc0
[ 3813.886841]  do_syscall_64+0x106/0x360
[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

This issue can be reproduced with the following syzkaller log:

r0 = openat(0xffffffffffffff9c, &amp;(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &amp;(0x7f0000000000)='fd/3\x00')
open_by_handle_at(r1, &amp;(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)
r2 = syz_open_dev$sg(&amp;(0x7f0000000000), 0x0, 0x40782)
write$binfmt_aout(r2, &amp;(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126)

In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass
the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This
leads to OOB in sg_copy_buffer().

To solve this issue, define alloc_len as u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: sysfs: Fix hang when device state is set via sysfs

This fixes a regression added with:

commit f0f82e2476f6 ("scsi: core: Fix capacity set to zero after
offlinining device")

The problem is that after iSCSI recovery, iscsid will call into the kernel
to set the dev's state to running, and with that patch we now call
scsi_rescan_device() with the state_mutex held. If the SCSI error handler
thread is just starting to test the device in scsi_send_eh_cmnd() then it's
going to try to grab the state_mutex.

We are then stuck, because when scsi_rescan_device() tries to send its I/O
scsi_queue_rq() calls -&gt; scsi_host_queue_ready() -&gt; scsi_host_in_recovery()
which will return true (the host state is still in recovery) and I/O will
just be requeued. scsi_send_eh_cmnd() will then never be able to grab the
state_mutex to finish error handling.

To prevent the deadlock move the rescan-related code to after we drop the
state_mutex.

This also adds a check for if we are already in the running state. This
prevents extra scans and helps the iscsid case where if the transport class
has already onlined the device during its recovery process then we don't
need userspace to do it again plus possibly block that daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Fix memory leak during rmmod

Driver failed to release all memory allocated. This would lead to memory
leak during driver removal.

Properly free memory when the module is removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: call cfg80211_stop_ap when switch from P2P_GO type

If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata-&gt;assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free of the add_lock mutex

Commit 6098475d4cb4 ("spi: Fix deadlock when adding SPI controllers on
SPI buses") introduced a per-controller mutex. But mutex_unlock() of
said lock is called after the controller is already freed:

  spi_unregister_controller(ctlr)
  -&gt; put_device(&amp;ctlr-&gt;dev)
    -&gt; spi_controller_release(dev)
  -&gt; mutex_unlock(&amp;ctrl-&gt;add_lock)

Move the put_device() after the mutex_unlock().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47196</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Set send and receive CQ before forwarding to the driver

Preset both receive and send CQ pointers prior to call to the drivers and
overwrite it later again till the mlx4 is going to be changed do not
overwrite ibqp properties.

This change is needed for mlx5, because in case of QP creation failure, it
will go to the path of QP destroy which relies on proper CQ pointers.

 BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]
 Write of size 8 at addr ffff8880064c55c0 by task a.out/246

 CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Call Trace:
  dump_stack_lvl+0x45/0x59
  print_address_description.constprop.0+0x1f/0x140
  kasan_report.cold+0x83/0xdf
  create_qp.cold+0x164/0x16e [mlx5_ib]
  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]
  create_qp.part.0+0x45b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Allocated by task 246:
  kasan_save_stack+0x1b/0x40
  __kasan_kmalloc+0xa4/0xd0
  create_qp.part.0+0x92/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Freed by task 246:
  kasan_save_stack+0x1b/0x40
  kasan_set_track+0x1c/0x30
  kasan_set_free_info+0x20/0x30
  __kasan_slab_free+0x10c/0x150
  slab_free_freelist_hook+0xb4/0x1b0
  kfree+0xe7/0x2a0
  create_qp.part.0+0x52b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47197</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: nullify cq-&gt;dbg pointer in mlx5_debug_cq_remove()

Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds
to rest of destroy operations. mlx5_core_destroy_cq() could be called again
by user and cause additional call of mlx5_debug_cq_remove().
cq-&gt;dbg was not nullify in previous call and cause the crash.

Fix it by nullify cq-&gt;dbg pointer after removal.

Also proceed to destroy operations only if FW return 0
for MLX5_CMD_OP_DESTROY_CQ command.

general protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI
CPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:lockref_get+0x1/0x60
Code: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02
00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 &lt;48&gt; 8b 17
48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48
RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe
RDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058
RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000
R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0
FS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0
Call Trace:
  simple_recursive_removal+0x33/0x2e0
  ? debugfs_remove+0x60/0x60
  debugfs_remove+0x40/0x60
  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]
  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]
  devx_obj_cleanup+0x151/0x330 [mlx5_ib]
  ? __pollwait+0xd0/0xd0
  ? xas_load+0x5/0x70
  ? xa_load+0x62/0xa0
  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]
  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]
  uobj_destroy+0x54/0xa0 [ib_uverbs]
  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]
  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]
  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]
  __x64_sys_ioctl+0x3e4/0x8e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47198</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine

An error is detected with the following report when unloading the driver:
  "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"

The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the
flag is not cleared upon completion of the login.

This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set
to LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used
as an rpi_ids array index.

Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in
lpfc_mbx_cmpl_fc_reg_login().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47199</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT, Fix multiple allocations and memleak of mod acts

CT clear action offload adds additional mod hdr actions to the
flow's original mod actions in order to clear the registers which
hold ct_state.
When such flow also includes encap action, a neigh update event
can cause the driver to unoffload the flow and then reoffload it.

Each time this happens, the ct clear handling adds that same set
of mod hdr actions to reset ct_state until the max of mod hdr
actions is reached.

Also the driver never releases the allocated mod hdr actions and
causing a memleak.

Fix above two issues by moving CT clear mod acts allocation
into the parsing actions phase and only use it when offloading the rule.
The release of mod acts will be done in the normal flow_put().

 backtrace:
    [&lt;000000007316e2f3&gt;] krealloc+0x83/0xd0
    [&lt;00000000ef157de1&gt;] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]
    [&lt;00000000970ce4ae&gt;] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]
    [&lt;0000000067c5fa17&gt;] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]
    [&lt;00000000d032eb98&gt;] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]
    [&lt;00000000fd23b869&gt;] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]
    [&lt;000000004fc24acc&gt;] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]
    [&lt;00000000dc741c17&gt;] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]
    [&lt;00000000e92e49d7&gt;] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]
    [&lt;00000000f60f5602&gt;] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47200</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap

drm_gem_ttm_mmap() drops a reference to the gem object on success. If
the gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that
drop will free the gem object, and the subsequent drm_gem_object_get()
will be a UAF. Fix by grabbing a reference before calling the mmap
helper.

This issue was forseen when the reference dropping was adding in
commit 9786b65bc61ac ("drm/ttm: fix mmap refcounting"):
  "For that to work properly the drm_gem_object_get() call in
  drm_gem_ttm_mmap() must be moved so it happens before calling
  obj-&gt;funcs-&gt;mmap(), otherwise the gem refcount would go down
  to zero."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47201</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: free q_vectors before queues in iavf_disable_vf

iavf_free_queues() clears adapter-&gt;num_active_queues, which
iavf_free_q_vectors() relies on, so swap the order of these two function
calls in iavf_disable_vf(). This resolves a panic encountered when the
interface is disabled and then later brought up again after PF
communication is restored.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47202</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: Fix NULL pointer dereferences in of_thermal_ functions

of_parse_thermal_zones() parses the thermal-zones node and registers a
thermal_zone device for each subnode. However, if a thermal zone is
consuming a thermal sensor and that thermal sensor device hasn't probed
yet, an attempt to set trip_point_*_temp for that thermal zone device
can cause a NULL pointer dereference. Fix it.

 console:/sys/class/thermal/thermal_zone87 # echo 120000 &gt; trip_point_0_temp
 ...
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
 ...
 Call trace:
  of_thermal_set_trip_temp+0x40/0xc4
  trip_point_temp_store+0xc0/0x1dc
  dev_attr_store+0x38/0x88
  sysfs_kf_write+0x64/0xc0
  kernfs_fop_write_iter+0x108/0x1d0
  vfs_write+0x2f4/0x368
  ksys_write+0x7c/0xec
  __arm64_sys_write+0x20/0x30
  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc
  do_el0_svc+0x28/0xa0
  el0_svc+0x14/0x24
  el0_sync_handler+0x88/0xec
  el0_sync+0x1c0/0x200

While at it, fix the possible NULL pointer dereference in other
functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),
of_thermal_get_trend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47203</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()

When parsing the txq list in lpfc_drain_txq(), the driver attempts to pass
the requests to the adapter. If such an attempt fails, a local "fail_msg"
string is set and a log message output.  The job is then added to a
completions list for cancellation.

Processing of any further jobs from the txq list continues, but since
"fail_msg" remains set, jobs are added to the completions list regardless
of whether a wqe was passed to the adapter.  If successfully added to
txcmplq, jobs are added to both lists resulting in list corruption.

Fix by clearing the fail_msg string after adding a job to the completions
list. This stops the subsequent jobs from being added to the completions
list unless they had an appropriate failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47204</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove

Access to netdev after free_netdev() will cause use-after-free bug.
Move debug log before free_netdev() call to avoid it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47205</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: Unregister clocks/resets when unbinding

Currently, unbinding a CCU driver unmaps the device's MMIO region, while
leaving its clocks/resets and their providers registered. This can cause
a page fault later when some clock operation tries to perform MMIO. Fix
this by separating the CCU initialization from the memory allocation,
and then using a devres callback to unregister the clocks and resets.

This also fixes a memory leak of the `struct ccu_reset`, and uses the
correct owner (the specific platform driver) for the clocks and resets.

Early OF clock providers are never unregistered, and limited error
handling is possible, so they are mostly unchanged. The error reporting
is made more consistent by moving the message inside of_sunxi_ccu_probe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: ohci-tmio: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47207</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: gus: fix null pointer dereference on pointer block

The pointer block return from snd_gf1_dma_next_block could be
null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47209</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Prevent dead task groups from regaining cfs_rq's

Kevin is reporting crashes which point to a use-after-free of a cfs_rq
in update_blocked_averages(). Initial debugging revealed that we've
live cfs_rq's (on_list=1) in an about to be kfree()'d task group in
free_fair_sched_group(). However, it was unclear how that can happen.

His kernel config happened to lead to a layout of struct sched_entity
that put the 'my_q' member directly into the middle of the object
which makes it incidentally overlap with SLUB's freelist pointer.
That, in combination with SLAB_FREELIST_HARDENED's freelist pointer
mangling, leads to a reliable access violation in form of a #GP which
made the UAF fail fast.

Michal seems to have run into the same issue[1]. He already correctly
diagnosed that commit a7b359fc6a37 ("sched/fair: Correctly insert
cfs_rq's to list on unthrottle") is causing the preconditions for the
UAF to happen by re-adding cfs_rq's also to task groups that have no
more running tasks, i.e. also to dead ones. His analysis, however,
misses the real root cause and it cannot be seen from the crash
backtrace only, as the real offender is tg_unthrottle_up() getting
called via sched_cfs_period_timer() via the timer interrupt at an
inconvenient time.

When unregister_fair_sched_group() unlinks all cfs_rq's from the dying
task group, it doesn't protect itself from getting interrupted. If the
timer interrupt triggers while we iterate over all CPUs or after
unregister_fair_sched_group() has finished but prior to unlinking the
task group, sched_cfs_period_timer() will execute and walk the list of
task groups, trying to unthrottle cfs_rq's, i.e. re-add them to the
dying task group. These will later -- in free_fair_sched_group() -- be
kfree()'ed while still being linked, leading to the fireworks Kevin
and Michal are seeing.

To fix this race, ensure the dying task group gets unlinked first.
However, simply switching the order of unregistering and unlinking the
task group isn't sufficient, as concurrent RCU walkers might still see
it, as can be seen below:

    CPU1:                                      CPU2:
      :                                        timer IRQ:
      :                                          do_sched_cfs_period_timer():
      :                                            :
      :                                            distribute_cfs_runtime():
      :                                              rcu_read_lock();
      :                                              :
      :                                              unthrottle_cfs_rq():
    sched_offline_group():                             :
      :                                                walk_tg_tree_from(…,tg_unthrottle_up,…):
      list_del_rcu(&amp;tg-&gt;list);                           :
 (1)  :                                                  list_for_each_entry_rcu(child, &amp;parent-&gt;children, siblings)
      :                                                    :
 (2)  list_del_rcu(&amp;tg-&gt;siblings);                         :
      :                                                    tg_unthrottle_up():
      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-&gt;cfs_rq[cpu_of(rq)];
        :                                                    :
        list_del_leaf_cfs_rq(tg-&gt;cfs_rq[cpu]);               :
        :                                                    :
        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-&gt;nr_running)
 (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);
      :                                                      :
      :                                                    :
      :                                                  :
      :                                                :
      :                           
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47210</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Remove WARN_ON in tps6598x_block_read

Calling tps6598x_block_read with a higher than allowed len can be
handled by just returning an error. There's no need to crash systems
with panic-on-warn enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47211</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: fix null pointer dereference on pointer cs_desc

The pointer cs_desc return from snd_usb_find_clock_source could
be null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47212</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Update error handler for UCTX and UMEM

In the fast unload flow, the device state is set to internal error,
which indicates that the driver started the destroy process.
In this case, when a destroy command is being executed, it should return
MLX5_CMD_STAT_OK.
Fix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK
instead of EIO.

This fixes a call trace in the umem release process -
[ 2633.536695] Call Trace:
[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]
[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]
[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]
[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]
[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]
[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]
[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]
[ 2633.544661]  device_release_driver_internal+0x103/0x1f0
[ 2633.545679]  bus_remove_device+0xf7/0x170
[ 2633.546640]  device_del+0x181/0x410
[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]
[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]
[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]
[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]
[ 2633.551819]  pci_device_remove+0x3b/0xc0
[ 2633.552731]  device_release_driver_internal+0x103/0x1f0
[ 2633.553746]  unbind_store+0xf6/0x130
[ 2633.554657]  kernfs_fop_write+0x116/0x190
[ 2633.555567]  vfs_write+0xa5/0x1a0
[ 2633.556407]  ksys_write+0x4f/0xb0
[ 2633.557233]  do_syscall_64+0x5b/0x1a0
[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 2633.559018] RIP: 0033:0x7f9977132648
[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55
[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648
[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001
[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740
[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0
[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c
[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47214</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47214" ref_url="https://www.suse.com/security/cve/CVE-2021-47214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hugetlb, userfaultfd: fix reservation restore on userfaultfd error

Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we
bail out using "goto out_release_unlock;" in the cases where idx &gt;=
size, or !huge_pte_none(), the code will detect that new_pagecache_page
== false, and so call restore_reserve_on_error().  In this case I see
restore_reserve_on_error() delete the reservation, and the following
call to remove_inode_hugepages() will increment h-&gt;resv_hugepages
causing a 100% reproducible leak.

We should treat the is_continue case similar to adding a page into the
pagecache and set new_pagecache_page to true, to indicate that there is
no reservation to restore on the error path, and we need not call
restore_reserve_on_error().  Rename new_pagecache_page to
page_in_pagecache to make that clear.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47214/">CVE-2021-47214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47214">CVE-2021-47214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222710">SUSE bug 1222710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47215</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: kTLS, Fix crash in RX resync flow

For the TLS RX resync flow, we maintain a list of TLS contexts
that require some attention, to communicate their resync information
to the HW.
Here we fix list corruptions, by protecting the entries against
movements coming from resync_handle_seq_match(), until their resync
handling in napi is fully completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47216</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: advansys: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long' and printed with %lx.

Change %lx to %p to print the hashed pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47217</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails

Check for a valid hv_vp_index array prior to derefencing hv_vp_index when
setting Hyper-V's TSC change callback.  If Hyper-V setup failed in
hyperv_init(), the kernel will still report that it's running under
Hyper-V, but will have silently disabled nearly all functionality.

  BUG: kernel NULL pointer dereference, address: 0000000000000010
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0
  Code: &lt;8b&gt; 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08
  ...
  Call Trace:
   kvm_arch_init+0x17c/0x280
   kvm_init+0x31/0x330
   vmx_init+0xba/0x13a
   do_one_initcall+0x41/0x1c0
   kernel_init_freeable+0x1f2/0x23b
   kernel_init+0x16/0x120
   ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: fix NULL-pointer dereference when hashtab allocation fails

When the hash table slot array allocation fails in hashtab_init(),
h-&gt;size is left initialized with a non-zero value, but the h-&gt;htable
pointer is NULL. This may then cause a NULL pointer dereference, since
the policydb code relies on the assumption that even after a failed
hashtab_init(), hashtab_map() and hashtab_destroy() can be safely called
on it. Yet, these detect an empty hashtab only by looking at the size.

Fix this by making sure that hashtab_init() always leaves behind a valid
empty hashtab when the allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47219</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()

The following issue was observed running syzkaller:

BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]
BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
Read of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815

CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xe4/0x14a lib/dump_stack.c:118
 print_address_description+0x73/0x280 mm/kasan/report.c:253
 kasan_report_error mm/kasan/report.c:352 [inline]
 kasan_report+0x272/0x370 mm/kasan/report.c:410
 memcpy+0x1f/0x50 mm/kasan/kasan.c:302
 memcpy include/linux/string.h:377 [inline]
 sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
 fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021
 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772
 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429
 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835
 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896
 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034
 __blk_run_queue_uncond block/blk-core.c:464 [inline]
 __blk_run_queue+0x1a4/0x380 block/blk-core.c:484
 blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78
 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847
 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716
 sg_write+0x64/0xa0 drivers/scsi/sg.c:622
 __vfs_write+0xed/0x690 fs/read_write.c:485
kill_bdev:block_device:00000000e138492c
 vfs_write+0x184/0x4c0 fs/read_write.c:549
 ksys_write+0x107/0x240 fs/read_write.c:599
 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

We get 'alen' from command its type is int. If userspace passes a large
length we will get a negative 'alen'.

Switch n, alen, and rlen to u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47358</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47358" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: greybus: uart: fix tty use after free

User space can hold a tty open indefinitely and tty drivers must not
release the underlying structures until the last user is gone.

Switch to using the tty-port reference counter to manage the life time
of the greybus tty state to avoid use after free after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47359</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47359" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix soft lockup during fsstress

Below traces are observed during fsstress and system got hung.
[  130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47360</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47360" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: make sure fd closes complete

During BC_FREE_BUFFER processing, the BINDER_TYPE_FDA object
cleanup may close 1 or more fds. The close operations are
completed using the task work mechanism -- which means the thread
needs to return to userspace or the file object may never be
dereferenced -- which can lead to hung processes.

Force the binder thread back to userspace if an fd is closed during
BC_FREE_BUFFER handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47361</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47361" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mcb: fix error handling in mcb_alloc_bus()

There are two bugs:
1) If ida_simple_get() fails then this code calls put_device(carrier)
   but we haven't yet called get_device(carrier) and probably that
   leads to a use after free.
2) After device_initialize() then we need to use put_device() to
   release the bus.  This will free the internal resources tied to the
   device and call mcb_free_bus() which will free the rest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47362</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47362" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Update intermediate power state for SI

Update the current state as boot state during dpm initialization.
During the subsequent initialization, set_power_state gets called to
transition to the final power state. set_power_state refers to values
from the current state and without current state populated, it could
result in NULL pointer dereference.

For ex: on platforms where PCI speed change is supported through ACPI
ATCS method, the link speed of current state needs to be queried before
deciding on changing to final power state's link speed. The logic to query
ATCS-support was broken on certain platforms. The issue became visible
when broken ATCS-support logic got fixed with commit
f9b7f3703ff9 ("drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)").

Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47363</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix division by zero while replacing a resilient group

The resilient nexthop group torture tests in fib_nexthop.sh exposed a
possible division by zero while replacing a resilient group [1]. The
division by zero occurs when the data path sees a resilient nexthop
group with zero buckets.

The tests replace a resilient nexthop group in a loop while traffic is
forwarded through it. The tests do not specify the number of buckets
while performing the replacement, resulting in the kernel allocating a
stub resilient table (i.e, 'struct nh_res_table') with zero buckets.

This table should never be visible to the data path, but the old nexthop
group (i.e., 'oldg') might still be used by the data path when the stub
table is assigned to it.

Fix this by only assigning the stub table to the old nexthop group after
making sure the group is no longer used by the data path.

Tested with fib_nexthops.sh:

Tests passed: 222
Tests failed:   0

[1]
 divide error: 0000 [#1] PREEMPT SMP KASAN
 CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:nexthop_select_path+0x2d2/0x1a80
[...]
 Call Trace:
  fib_select_multipath+0x79b/0x1530
  fib_select_path+0x8fb/0x1c10
  ip_route_output_key_hash_rcu+0x1198/0x2da0
  ip_route_output_key_hash+0x190/0x340
  ip_route_output_flow+0x21/0x120
  raw_sendmsg+0x91d/0x2e10
  inet_sendmsg+0x9e/0xe0
  __sys_sendto+0x23d/0x360
  __x64_sys_sendto+0xe1/0x1b0
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47364</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix memory leak in compat_insnlist()

`compat_insnlist()` handles the 32-bit version of the `COMEDI_INSNLIST`
ioctl (whenwhen `CONFIG_COMPAT` is enabled).  It allocates memory to
temporarily hold an array of `struct comedi_insn` converted from the
32-bit version in user space.  This memory is only being freed if there
is a fault while filling the array, otherwise it is leaked.

Add a call to `kfree()` to fix the leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47365</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix page leak

There's a loop in afs_extend_writeback() that adds extra pages to a write
we want to make to improve the efficiency of the writeback by making it
larger.  This loop stops, however, if we hit a page we can't write back
from immediately, but it doesn't get rid of the page ref we speculatively
acquired.

This was caused by the removal of the cleanup loop when the code switched
from using find_get_pages_contig() to xarray scanning as the latter only
gets a single page at a time, not a batch.

Fix this by putting the page on a ref on an early break from the loop.
Unfortunately, we can't just add that page to the pagevec we're employing
as we'll go through that and add those pages to the RPC call.

This was found by the generic/074 test.  It leaks ~4GiB of RAM each time it
is run - which can be observed with "top".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47366</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47366" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server

AFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and
Linux's afs client switches between them when talking to a non-YFS server
if the read size, the file position or the sum of the two have the upper 32
bits set of the 64-bit value.

This is a problem, however, since the file position and length fields of
FS.FetchData are *signed* 32-bit values.

Fix this by capturing the capability bits obtained from the fileserver when
it's sent an FS.GetCapabilities RPC, rather than just discarding them, and
then picking out the VICED_CAPABILITY_64BITFILES flag.  This can then be
used to decide whether to use FS.FetchData or FS.FetchData64 - and also
FS.StoreData or FS.StoreData64 - rather than using upper_32_bits() to
switch on the parameter values.

This capabilities flag could also be used to limit the maximum size of the
file, but all servers must be checked for that.

Note that the issue does not exist with FS.StoreData - that uses *unsigned*
32-bit values.  It's also not a problem with Auristor servers as its
YFS.FetchData64 op uses unsigned 64-bit values.

This can be tested by cloning a git repo through an OpenAFS client to an
OpenAFS server and then doing "git status" on it from a Linux afs
client[1].  Provided the clone has a pack file that's in the 2G-4G range,
the git status will show errors like:

	error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
	error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index

This can be observed in the server's FileLog with something like the
following appearing:

Sun Aug 29 19:31:39 2021 SRXAFS_FetchData, Fid = 2303380852.491776.3263114, Host 192.168.11.201:7001, Id 1001
Sun Aug 29 19:31:39 2021 CheckRights: len=0, for host=192.168.11.201:7001
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: Pos 18446744071815340032, Len 3154
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: file size 2400758866
...
Sun Aug 29 19:31:40 2021 SRXAFS_FetchData returns 5

Note the file position of 18446744071815340032.  This is the requested file
position sign-extended.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47367</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47367" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix pages leaking when building skb in big mode

We try to use build_skb() if we had sufficient tailroom. But we forget
to release the unused pages chained via private in big mode which will
leak pages. Fixing this by release the pages after building the skb in
big mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47368</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47368" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

enetc: Fix illegal access when reading affinity_hint

irq_set_affinity_hit() stores a reference to the cpumask_t
parameter in the irq descriptor, and that reference can be
accessed later from irq_affinity_hint_proc_show(). Since
the cpu_mask parameter passed to irq_set_affinity_hit() has
only temporary storage (it's on the stack memory), later
accesses to it are illegal. Thus reads from the corresponding
procfs affinity_hint file can result in paging request oops.

The issue is fixed by the get_cpu_mask() helper, which provides
a permanent storage for the cpumask_t parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47369</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47369" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix NULL deref in qeth_clear_working_pool_list()

When qeth_set_online() calls qeth_clear_working_pool_list() to roll
back after an error exit from qeth_hardsetup_card(), we are at risk of
accessing card-&gt;qdio.in_q before it was allocated by
qeth_alloc_qdio_queues() via qeth_mpc_initialize().

qeth_clear_working_pool_list() then dereferences NULL, and by writing to
queue-&gt;bufs[i].pool_entry scribbles all over the CPU's lowcore.
Resulting in a crash when those lowcore areas are used next (eg. on
the next machine-check interrupt).

Such a scenario would typically happen when the device is first set
online and its queues aren't allocated yet. An early IO error or certain
misconfigs (eg. mismatched transport mode, bad portno) then cause us to
error out from qeth_hardsetup_card() with card-&gt;qdio.in_q still being
NULL.

Fix it by checking the pointer for NULL before accessing it.

Note that we also have (rare) paths inside qeth_mpc_initialize() where
a configuration change can cause us to free the existing queues,
expecting that subsequent code will allocate them again. If we then
error out before that re-allocation happens, the same bug occurs.

Root-caused-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227324">SUSE bug 1227324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47370</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47370" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure tx skbs always have the MPTCP ext

Due to signed/unsigned comparison, the expression:

	info-&gt;size_goal - skb-&gt;len &gt; 0

evaluates to true when the size goal is smaller than the
skb size. That results in lack of tx cache refill, so that
the skb allocated by the core TCP code lacks the required
MPTCP skb extensions.

Due to the above, syzbot is able to trigger the following WARN_ON():

WARNING: CPU: 1 PID: 810 at net/mptcp/protocol.c:1366 mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Modules linked in:
CPU: 1 PID: 810 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Code: ff 4c 8b 74 24 50 48 8b 5c 24 58 e9 0f fb ff ff e8 13 44 8b f8 4c 89 e7 45 31 ed e8 98 57 2e fe e9 81 f4 ff ff e8 fe 43 8b f8 &lt;0f&gt; 0b 41 bd ea ff ff ff e9 6f f4 ff ff 4c 89 e7 e8 b9 8e d2 f8 e9
RSP: 0018:ffffc9000531f6a0 EFLAGS: 00010216
RAX: 000000000000697f RBX: 0000000000000000 RCX: ffffc90012107000
RDX: 0000000000040000 RSI: ffffffff88eac9e2 RDI: 0000000000000003
RBP: ffff888078b15780 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff88eac017 R11: 0000000000000000 R12: ffff88801de0a280
R13: 0000000000006b58 R14: ffff888066278280 R15: ffff88803c2fe9c0
FS:  00007fd9f866e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faebcb2f718 CR3: 00000000267cb000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __mptcp_push_pending+0x1fb/0x6b0 net/mptcp/protocol.c:1547
 mptcp_release_cb+0xfe/0x210 net/mptcp/protocol.c:3003
 release_sock+0xb4/0x1b0 net/core/sock.c:3206
 sk_stream_wait_memory+0x604/0xed0 net/core/stream.c:145
 mptcp_sendmsg+0xc39/0x1bc0 net/mptcp/protocol.c:1749
 inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:643
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 sock_write_iter+0x2a0/0x3e0 net/socket.c:1057
 call_write_iter include/linux/fs.h:2163 [inline]
 new_sync_write+0x40b/0x640 fs/read_write.c:507
 vfs_write+0x7cf/0xae0 fs/read_write.c:594
 ksys_write+0x1ee/0x250 fs/read_write.c:647
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd9f866e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9
RDX: 00000000000e7b78 RSI: 0000000020000000 RDI: 0000000000000003
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038
R13: 0000000000a9fb1f R14: 00007fd9f866e300 R15: 0000000000022000

Fix the issue rewriting the relevant expression to avoid
sign-related problems - note: size_goal is always &gt;= 0.

Additionally, ensure that the skb in the tx cache always carries
the relevant extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47371</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47371" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix memory leaks in nexthop notification chain listeners

syzkaller discovered memory leaks [1] that can be reduced to the
following commands:

 # ip nexthop add id 1 blackhole
 # devlink dev reload pci/0000:06:00.0

As part of the reload flow, mlxsw will unregister its netdevs and then
unregister from the nexthop notification chain. Before unregistering
from the notification chain, mlxsw will receive delete notifications for
nexthop objects using netdevs registered by mlxsw or their uppers. mlxsw
will not receive notifications for nexthops using netdevs that are not
dismantled as part of the reload flow. For example, the blackhole
nexthop above that internally uses the loopback netdev as its nexthop
device.

One way to fix this problem is to have listeners flush their nexthop
tables after unregistering from the notification chain. This is
error-prone as evident by this patch and also not symmetric with the
registration path where a listener receives a dump of all the existing
nexthops.

Therefore, fix this problem by replaying delete notifications for the
listener being unregistered. This is symmetric to the registration path
and also consistent with the netdev notification chain.

The above means that unregister_nexthop_notifier(), like
register_nexthop_notifier(), will have to take RTNL in order to iterate
over the existing nexthops and that any callers of the function cannot
hold RTNL. This is true for mlxsw and netdevsim, but not for the VXLAN
driver. To avoid a deadlock, change the latter to unregister its nexthop
listener without holding RTNL, making it symmetric to the registration
path.

[1]
unreferenced object 0xffff88806173d600 (size 512):
  comm "syz-executor.0", pid 1290, jiffies 4295583142 (age 143.507s)
  hex dump (first 32 bytes):
    41 9d 1e 60 80 88 ff ff 08 d6 73 61 80 88 ff ff  A..`......sa....
    08 d6 73 61 80 88 ff ff 01 00 00 00 00 00 00 00  ..sa............
  backtrace:
    [&lt;ffffffff81a6b576&gt;] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline]
    [&lt;ffffffff81a6b576&gt;] slab_post_alloc_hook+0x96/0x490 mm/slab.h:522
    [&lt;ffffffff81a716d3&gt;] slab_alloc_node mm/slub.c:3206 [inline]
    [&lt;ffffffff81a716d3&gt;] slab_alloc mm/slub.c:3214 [inline]
    [&lt;ffffffff81a716d3&gt;] kmem_cache_alloc_trace+0x163/0x370 mm/slub.c:3231
    [&lt;ffffffff82e8681a&gt;] kmalloc include/linux/slab.h:591 [inline]
    [&lt;ffffffff82e8681a&gt;] kzalloc include/linux/slab.h:721 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_group_create drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:4918 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_new drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5054 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_event+0x59a/0x2910 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5239
    [&lt;ffffffff813ef67d&gt;] notifier_call_chain+0xbd/0x210 kernel/notifier.c:83
    [&lt;ffffffff813f0662&gt;] blocking_notifier_call_chain kernel/notifier.c:318 [inline]
    [&lt;ffffffff813f0662&gt;] blocking_notifier_call_chain+0x72/0xa0 kernel/notifier.c:306
    [&lt;ffffffff8384b9c6&gt;] call_nexthop_notifiers+0x156/0x310 net/ipv4/nexthop.c:244
    [&lt;ffffffff83852bd8&gt;] insert_nexthop net/ipv4/nexthop.c:2336 [inline]
    [&lt;ffffffff83852bd8&gt;] nexthop_add net/ipv4/nexthop.c:2644 [inline]
    [&lt;ffffffff83852bd8&gt;] rtm_new_nexthop+0x14e8/0x4d10 net/ipv4/nexthop.c:2913
    [&lt;ffffffff833e9a78&gt;] rtnetlink_rcv_msg+0x448/0xbf0 net/core/rtnetlink.c:5572
    [&lt;ffffffff83608703&gt;] netlink_rcv_skb+0x173/0x480 net/netlink/af_netlink.c:2504
    [&lt;ffffffff833de032&gt;] rtnetlink_rcv+0x22/0x30 net/core/rtnetlink.c:5590
    [&lt;ffffffff836069de&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
    [&lt;ffffffff836069de&gt;] netlink_unicast+0x5ae/0x7f0 net/netlink/af_netlink.c:1340
    [&lt;ffffffff83607501&gt;] netlink_sendmsg+0x8e1/0xe30 net/netlink/af_netlink.c:1929
    [&lt;ffffffff832fde84&gt;] sock_sendmsg_nosec net/socket.c:704 [inline
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47372</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47372" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macb: fix use after free on rmmod

plat_dev-&gt;dev-&gt;platform_data is released by platform_device_unregister(),
use of pclk and hclk is a use-after-free. Since device unregister won't
need a clk device we adjust the function call sequence to fix this issue.

[   31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]
[   31.275563] Freed by task 306:
[   30.276782]  platform_device_release+0x25/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229946">SUSE bug 1229946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47373</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Fix potential VPE leak on error

In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,
there is an off-by-one in the number of VPEs to be freed.

Fix it by simply passing the number of VPEs allocated, which is the
index of the loop iterating over the VPEs.

[maz: fixed commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47374</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47374" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-debug: prevent an error message from causing runtime problems

For some drivers, that use the DMA API. This error message can be reached
several millions of times per second, causing spam to the kernel's printk
buffer and bringing the CPU usage up to 100% (so, it should be rate
limited). However, since there is at least one driver that is in the
mainline and suffers from the error condition, it is more useful to
err_printk() here instead of just rate limiting the error message (in hopes
that it will make it easier for other drivers that suffer from this issue
to be spotted).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47375</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47375" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blktrace: Fix uaf in blk_trace access after removing by sysfs

There is an use-after-free problem triggered by following process:

      P1(sda)				P2(sdb)
			echo 0 &gt; /sys/block/sdb/trace/enable
			  blk_trace_remove_queue
			    synchronize_rcu
			    blk_trace_free
			      relay_close
rcu_read_lock
__blk_add_trace
  trace_note_tsk
  (Iterate running_trace_list)
			        relay_close_buf
				  relay_destroy_buf
				    kfree(buf)
    trace_note(sdb's bt)
      relay_reserve
        buf-&gt;offset &lt;- nullptr deference (use-after-free) !!!
rcu_read_unlock

[  502.714379] BUG: kernel NULL pointer dereference, address:
0000000000000010
[  502.715260] #PF: supervisor read access in kernel mode
[  502.715903] #PF: error_code(0x0000) - not-present page
[  502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0
[  502.717252] Oops: 0000 [#1] SMP
[  502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360
[  502.732872] Call Trace:
[  502.733193]  __blk_add_trace.cold+0x137/0x1a3
[  502.733734]  blk_add_trace_rq+0x7b/0xd0
[  502.734207]  blk_add_trace_rq_issue+0x54/0xa0
[  502.734755]  blk_mq_start_request+0xde/0x1b0
[  502.735287]  scsi_queue_rq+0x528/0x1140
...
[  502.742704]  sg_new_write.isra.0+0x16e/0x3e0
[  502.747501]  sg_ioctl+0x466/0x1100

Reproduce method:
  ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])
  ioctl(/dev/sda, BLKTRACESTART)
  ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])
  ioctl(/dev/sdb, BLKTRACESTART)

  echo 0 &gt; /sys/block/sdb/trace/enable &amp;
  // Add delay(mdelay/msleep) before kernel enters blk_trace_free()

  ioctl$SG_IO(/dev/sda, SG_IO, ...)
  // Enters trace_note_tsk() after blk_trace_free() returned
  // Use mdelay in rcu region rather than msleep(which may schedule out)

Remove blk_trace from running_list before calling blk_trace_free() by
sysfs if blk_trace is at Blktrace_running state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225194">SUSE bug 1225194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47376</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47376" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add oversize check before call kvcalloc()

Commit 7661809d493b ("mm: don't allow oversized kvmalloc() calls") add the
oversize check. When the allocation is larger than what kmalloc() supports,
the following warning triggered:

WARNING: CPU: 0 PID: 8408 at mm/util.c:597 kvmalloc_node+0x108/0x110 mm/util.c:597
Modules linked in:
CPU: 0 PID: 8408 Comm: syz-executor221 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:kvmalloc_node+0x108/0x110 mm/util.c:597
Call Trace:
 kvmalloc include/linux/mm.h:806 [inline]
 kvmalloc_array include/linux/mm.h:824 [inline]
 kvcalloc include/linux/mm.h:829 [inline]
 check_btf_line kernel/bpf/verifier.c:9925 [inline]
 check_btf_info kernel/bpf/verifier.c:10049 [inline]
 bpf_check+0xd634/0x150d0 kernel/bpf/verifier.c:13759
 bpf_prog_load kernel/bpf/syscall.c:2301 [inline]
 __sys_bpf+0x11181/0x126e0 kernel/bpf/syscall.c:4587
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47378</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: destroy cm id before destroy qp to avoid use after free

We should always destroy cm_id before destroy qp to avoid to get cma
event after qp was destroyed, which may lead to use after free.
In RDMA connection establishment error flow, don't destroy qp in cm
event handler.Just report cm_error to upper level, qp will be destroy
in nvme_rdma_alloc_queue() after destroy cm id.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225202">SUSE bug 1225202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47379</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47379" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd

KASAN reports a use-after-free report when doing fuzz test:

[693354.104835] ==================================================================
[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160
[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338

[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147
[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018
[693354.105612] Call Trace:
[693354.105621]  dump_stack+0xf1/0x19b
[693354.105626]  ? show_regs_print_info+0x5/0x5
[693354.105634]  ? printk+0x9c/0xc3
[693354.105638]  ? cpumask_weight+0x1f/0x1f
[693354.105648]  print_address_description+0x70/0x360
[693354.105654]  kasan_report+0x1b2/0x330
[693354.105659]  ? bfq_io_set_weight_legacy+0xd3/0x160
[693354.105665]  ? bfq_io_set_weight_legacy+0xd3/0x160
[693354.105670]  bfq_io_set_weight_legacy+0xd3/0x160
[693354.105675]  ? bfq_cpd_init+0x20/0x20
[693354.105683]  cgroup_file_write+0x3aa/0x510
[693354.105693]  ? ___slab_alloc+0x507/0x540
[693354.105698]  ? cgroup_file_poll+0x60/0x60
[693354.105702]  ? 0xffffffff89600000
[693354.105708]  ? usercopy_abort+0x90/0x90
[693354.105716]  ? mutex_lock+0xef/0x180
[693354.105726]  kernfs_fop_write+0x1ab/0x280
[693354.105732]  ? cgroup_file_poll+0x60/0x60
[693354.105738]  vfs_write+0xe7/0x230
[693354.105744]  ksys_write+0xb0/0x140
[693354.105749]  ? __ia32_sys_read+0x50/0x50
[693354.105760]  do_syscall_64+0x112/0x370
[693354.105766]  ? syscall_return_slowpath+0x260/0x260
[693354.105772]  ? do_page_fault+0x9b/0x270
[693354.105779]  ? prepare_exit_to_usermode+0xf9/0x1a0
[693354.105784]  ? enter_from_user_mode+0x30/0x30
[693354.105793]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.105875] Allocated by task 1453337:
[693354.106001]  kasan_kmalloc+0xa0/0xd0
[693354.106006]  kmem_cache_alloc_node_trace+0x108/0x220
[693354.106010]  bfq_pd_alloc+0x96/0x120
[693354.106015]  blkcg_activate_policy+0x1b7/0x2b0
[693354.106020]  bfq_create_group_hierarchy+0x1e/0x80
[693354.106026]  bfq_init_queue+0x678/0x8c0
[693354.106031]  blk_mq_init_sched+0x1f8/0x460
[693354.106037]  elevator_switch_mq+0xe1/0x240
[693354.106041]  elevator_switch+0x25/0x40
[693354.106045]  elv_iosched_store+0x1a1/0x230
[693354.106049]  queue_attr_store+0x78/0xb0
[693354.106053]  kernfs_fop_write+0x1ab/0x280
[693354.106056]  vfs_write+0xe7/0x230
[693354.106060]  ksys_write+0xb0/0x140
[693354.106064]  do_syscall_64+0x112/0x370
[693354.106069]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.106114] Freed by task 1453336:
[693354.106225]  __kasan_slab_free+0x130/0x180
[693354.106229]  kfree+0x90/0x1b0
[693354.106233]  blkcg_deactivate_policy+0x12c/0x220
[693354.106238]  bfq_exit_queue+0xf5/0x110
[693354.106241]  blk_mq_exit_sched+0x104/0x130
[693354.106245]  __elevator_exit+0x45/0x60
[693354.106249]  elevator_switch_mq+0xd6/0x240
[693354.106253]  elevator_switch+0x25/0x40
[693354.106257]  elv_iosched_store+0x1a1/0x230
[693354.106261]  queue_attr_store+0x78/0xb0
[693354.106264]  kernfs_fop_write+0x1ab/0x280
[693354.106268]  vfs_write+0xe7/0x230
[693354.106271]  ksys_write+0xb0/0x140
[693354.106275]  do_syscall_64+0x112/0x370
[693354.106280]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.106329] The buggy address belongs to the object at ffff888be0a35580
                 which belongs to the cache kmalloc-1k of size 1024
[693354.106736] The buggy address is located 228 bytes inside of
                 1024-byte region [ffff888be0a35580, ffff888be0a35980)
[693354.107114] The buggy address belongs to the page:
[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0
[693354.107606] flags: 0x17ffffc0008100(slab|head)
[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080
[693354.108020] r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225204">SUSE bug 1225204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47380</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47380" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Fix potential NULL pointer dereference

devm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at
registration that will cause NULL pointer dereference since
corresponding data is not initialized yet. The patch moves
initialization of data before devm_add_action_or_reset().

Found by Linux Driver Verification project (linuxtesting.org).

[jkosina@suse.cz: rebase]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47381</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47381" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Fix DSP oops stack dump output contents

Fix @buf arg given to hex_dump_to_buffer() and stack address used
in dump error output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47382</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47382" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix deadlock during failing recovery

Commit 0b9902c1fcc5 ("s390/qeth: fix deadlock during recovery") removed
taking discipline_mutex inside qeth_do_reset(), fixing potential
deadlocks. An error path was missed though, that still takes
discipline_mutex and thus has the original deadlock potential.

Intermittent deadlocks were seen when a qeth channel path is configured
offline, causing a race between qeth_do_reset and ccwgroup_remove.
Call qeth_set_offline() directly in the qeth_do_reset() error case and
then a new variant of ccwgroup_set_offline(), without taking
discipline_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47383</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: Fix out-of-bound vmalloc access in imageblit

This issue happens when a userspace program does an ioctl
FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct
containing only the fields xres, yres, and bits_per_pixel
with values.

If this struct is the same as the previous ioctl, the
vc_resize() detects it and doesn't call the resize_screen(),
leaving the fb_var_screeninfo incomplete. And this leads to
the updatescrollmode() calculates a wrong value to
fbcon_display-&gt;vrows, which makes the real_y() return a
wrong value of y, and that value, eventually, causes
the imageblit to access an out-of-bound address value.

To solve this issue I made the resize_screen() be called
even if the screen does not need any resizing, so it will
"fix and fill" the fb_var_screeninfo independently.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225211">SUSE bug 1225211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47384</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47384" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field

If driver read tmp value sufficient for
(tmp &amp; 0x08) &amp;&amp; (!(tmp &amp; 0x80)) &amp;&amp; ((tmp &amp; 0x7) == ((tmp &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47385</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47385" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47386</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47386" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47387</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47387" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: schedutil: Use kobject release() method to free sugov_tunables

The struct sugov_tunables is protected by the kobject, so we can't free
it directly. Otherwise we would get a call trace like this:
  ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x30
  WARNING: CPU: 3 PID: 720 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100
  Modules linked in:
  CPU: 3 PID: 720 Comm: a.sh Tainted: G        W         5.14.0-rc1-next-20210715-yocto-standard+ #507
  Hardware name: Marvell OcteonTX CN96XX board (DT)
  pstate: 40400009 (nZcv daif +PAN -UAO -TCO BTYPE=--)
  pc : debug_print_object+0xb8/0x100
  lr : debug_print_object+0xb8/0x100
  sp : ffff80001ecaf910
  x29: ffff80001ecaf910 x28: ffff00011b10b8d0 x27: ffff800011043d80
  x26: ffff00011a8f0000 x25: ffff800013cb3ff0 x24: 0000000000000000
  x23: ffff80001142aa68 x22: ffff800011043d80 x21: ffff00010de46f20
  x20: ffff800013c0c520 x19: ffff800011d8f5b0 x18: 0000000000000010
  x17: 6e6968207473696c x16: 5f72656d6974203a x15: 6570797420746365
  x14: 6a626f2029302065 x13: 303378302f307830 x12: 2b6e665f72656d69
  x11: ffff8000124b1560 x10: ffff800012331520 x9 : ffff8000100ca6b0
  x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 0000000000000001
  x5 : ffff800011d8c000 x4 : ffff800011d8c740 x3 : 0000000000000000
  x2 : ffff0001108301c0 x1 : ab3c90eedf9c0f00 x0 : 0000000000000000
  Call trace:
   debug_print_object+0xb8/0x100
   __debug_check_no_obj_freed+0x1c0/0x230
   debug_check_no_obj_freed+0x20/0x88
   slab_free_freelist_hook+0x154/0x1c8
   kfree+0x114/0x5d0
   sugov_exit+0xbc/0xc0
   cpufreq_exit_governor+0x44/0x90
   cpufreq_set_policy+0x268/0x4a8
   store_scaling_governor+0xe0/0x128
   store+0xc0/0xf0
   sysfs_kf_write+0x54/0x80
   kernfs_fop_write_iter+0x128/0x1c0
   new_sync_write+0xf0/0x190
   vfs_write+0x2d4/0x478
   ksys_write+0x74/0x100
   __arm64_sys_write+0x24/0x30
   invoke_syscall.constprop.0+0x54/0xe0
   do_el0_svc+0x64/0x158
   el0_svc+0x2c/0xb0
   el0t_64_sync_handler+0xb0/0xb8
   el0t_64_sync+0x198/0x19c
  irq event stamp: 5518
  hardirqs last  enabled at (5517): [&lt;ffff8000100cbd7c&gt;] console_unlock+0x554/0x6c8
  hardirqs last disabled at (5518): [&lt;ffff800010fc0638&gt;] el1_dbg+0x28/0xa0
  softirqs last  enabled at (5504): [&lt;ffff8000100106e0&gt;] __do_softirq+0x4d0/0x6c0
  softirqs last disabled at (5483): [&lt;ffff800010049548&gt;] irq_exit+0x1b0/0x1b8

So split the original sugov_tunables_free() into two functions,
sugov_clear_global_tunables() is just used to clear the global_tunables
and the new sugov_tunables_free() is used as kobj_type::release to
release the sugov_tunables safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47388</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix use-after-free in CCMP/GCMP RX

When PN checking is done in mac80211, for fragmentation we need
to copy the PN to the RX struct so we can later use it to do a
comparison, since commit bf30ca922a0c ("mac80211: check defrag
PN against current frame").

Unfortunately, in that commit I used the 'hdr' variable without
it being necessarily valid, so use-after-free could occur if it
was necessary to reallocate (parts of) the frame.

Fix this by reloading the variable after the code that results
in the reallocations, if any.

This fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47389" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: fix missing sev_decommission in sev_receive_start

DECOMMISSION the current SEV context if binding an ASID fails after
RECEIVE_START.  Per AMD's SEV API, RECEIVE_START generates a new guest
context and thus needs to be paired with DECOMMISSION:

     The RECEIVE_START command is the only command other than the LAUNCH_START
     command that generates a new guest context and guest handle.

The missing DECOMMISSION can result in subsequent SEV launch failures,
as the firmware leaks memory and might not able to allocate more SEV
guest contexts in the future.

Note, LAUNCH_START suffered the same bug, but was previously fixed by
commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID
binding fails").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47390</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47390" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()

KASAN reports the following issue:

 BUG: KASAN: stack-out-of-bounds in kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
 Read of size 8 at addr ffffc9001364f638 by task qemu-kvm/4798

 CPU: 0 PID: 4798 Comm: qemu-kvm Tainted: G               X --------- ---
 Hardware name: AMD Corporation DAYTONA_X/DAYTONA_X, BIOS RYM0081C 07/13/2020
 Call Trace:
  dump_stack+0xa5/0xe6
  print_address_description.constprop.0+0x18/0x130
  ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  __kasan_report.cold+0x7f/0x114
  ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  kasan_report+0x38/0x50
  kasan_check_range+0xf5/0x1d0
  kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  kvm_make_scan_ioapic_request_mask+0x84/0xc0 [kvm]
  ? kvm_arch_exit+0x110/0x110 [kvm]
  ? sched_clock+0x5/0x10
  ioapic_write_indirect+0x59f/0x9e0 [kvm]
  ? static_obj+0xc0/0xc0
  ? __lock_acquired+0x1d2/0x8c0
  ? kvm_ioapic_eoi_inject_work+0x120/0x120 [kvm]

The problem appears to be that 'vcpu_bitmap' is allocated as a single long
on stack and it should really be KVM_MAX_VCPUS long. We also seem to clear
the lower 16 bits of it with bitmap_zero() for no particular reason (my
guess would be that 'bitmap' and 'vcpu_bitmap' variables in
kvm_bitmap_or_dest_vcpus() caused the confusion: while the later is indeed
16-bit long, the later should accommodate all possible vCPUs).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47391</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47391" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests

The FSM can run in a circle allowing rdma_resolve_ip() to be called twice
on the same id_priv. While this cannot happen without going through the
work, it violates the invariant that the same address resolution
background request cannot be active twice.

       CPU 1                                  CPU 2

rdma_resolve_addr():
  RDMA_CM_IDLE -&gt; RDMA_CM_ADDR_QUERY
  rdma_resolve_ip(addr_handler)  #1

			 process_one_req(): for #1
                          addr_handler():
                            RDMA_CM_ADDR_QUERY -&gt; RDMA_CM_ADDR_BOUND
                            mutex_unlock(&amp;id_priv-&gt;handler_mutex);
                            [.. handler still running ..]

rdma_resolve_addr():
  RDMA_CM_ADDR_BOUND -&gt; RDMA_CM_ADDR_QUERY
  rdma_resolve_ip(addr_handler)
    !! two requests are now on the req_list

rdma_destroy_id():
 destroy_id_handler_unlock():
  _destroy_id():
   cma_cancel_operation():
    rdma_addr_cancel()

                          // process_one_req() self removes it
		          spin_lock_bh(&amp;lock);
                           cancel_delayed_work(&amp;req-&gt;work);
	                   if (!list_empty(&amp;req-&gt;list)) == true

      ! rdma_addr_cancel() returns after process_on_req #1 is done

   kfree(id_priv)

			 process_one_req(): for #2
                          addr_handler():
	                    mutex_lock(&amp;id_priv-&gt;handler_mutex);
                            !! Use after free on id_priv

rdma_addr_cancel() expects there to be one req on the list and only
cancels the first one. The self-removal behavior of the work only happens
after the handler has returned. This yields a situations where the
req_list can have two reqs for the same "handle" but rdma_addr_cancel()
only cancels the first one.

The second req remains active beyond rdma_destroy_id() and will
use-after-free id_priv once it inevitably triggers.

Fix this by remembering if the id_priv has called rdma_resolve_ip() and
always cancel before calling it again. This ensures the req_list never
gets more than one item in it and doesn't cost anything in the normal flow
that never uses this strange error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225319">SUSE bug 1225319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47392</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47392" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure

If cma_listen_on_all() fails it leaves the per-device ID still on the
listen_list but the state is not set to RDMA_CM_ADDR_BOUND.

When the cmid is eventually destroyed cma_cancel_listens() is not called
due to the wrong state, however the per-device IDs are still holding the
refcount preventing the ID from being destroyed, thus deadlocking:

 task:rping state:D stack:   0 pid:19605 ppid: 47036 flags:0x00000084
 Call Trace:
  __schedule+0x29a/0x780
  ? free_unref_page_commit+0x9b/0x110
  schedule+0x3c/0xa0
  schedule_timeout+0x215/0x2b0
  ? __flush_work+0x19e/0x1e0
  wait_for_completion+0x8d/0xf0
  _destroy_id+0x144/0x210 [rdma_cm]
  ucma_close_id+0x2b/0x40 [rdma_ucm]
  __destroy_id+0x93/0x2c0 [rdma_ucm]
  ? __xa_erase+0x4a/0xa0
  ucma_destroy_id+0x9a/0x120 [rdma_ucm]
  ucma_write+0xb8/0x130 [rdma_ucm]
  vfs_write+0xb4/0x250
  ksys_write+0xb5/0xd0
  ? syscall_trace_enter.isra.19+0x123/0x190
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xa9

Ensure that cma_listen_on_all() atomically unwinds its action under the
lock during error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47393</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47393" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs

Fan speed minimum can be enforced from sysfs. For example, setting
current fan speed to 20 is used to enforce fan speed to be at 100%
speed, 19 - to be not below 90% speed, etcetera. This feature provides
ability to limit fan speed according to some system wise
considerations, like absence of some replaceable units or high system
ambient temperature.

Request for changing fan minimum speed is configuration request and can
be set only through 'sysfs' write procedure. In this situation value of
argument 'state' is above nominal fan speed maximum.

Return non-zero code in this case to avoid
thermal_cooling_device_stats_update() call, because in this case
statistics update violates thermal statistics table range.
The issues is observed in case kernel is configured with option
CONFIG_THERMAL_STATISTICS.

Here is the trace from KASAN:
[  159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0
[  159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444
[  159.545625] Call Trace:
[  159.548366]  dump_stack+0x92/0xc1
[  159.552084]  ? thermal_cooling_device_stats_update+0x7d/0xb0
[  159.635869]  thermal_zone_device_update+0x345/0x780
[  159.688711]  thermal_zone_device_set_mode+0x7d/0xc0
[  159.694174]  mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]
[  159.700972]  ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]
[  159.731827]  mlxsw_thermal_init+0x763/0x880 [mlxsw_core]
[  160.070233] RIP: 0033:0x7fd995909970
[  160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ..
[  160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970
[  160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001
[  160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700
[  160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013
[  160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013
[  160.143671]
[  160.145338] Allocated by task 2924:
[  160.149242]  kasan_save_stack+0x19/0x40
[  160.153541]  __kasan_kmalloc+0x7f/0xa0
[  160.157743]  __kmalloc+0x1a2/0x2b0
[  160.161552]  thermal_cooling_device_setup_sysfs+0xf9/0x1a0
[  160.167687]  __thermal_cooling_device_register+0x1b5/0x500
[  160.173833]  devm_thermal_of_cooling_device_register+0x60/0xa0
[  160.180356]  mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]
[  160.248140]
[  160.249807] The buggy address belongs to the object at ffff888116163400
[  160.249807]  which belongs to the cache kmalloc-1k of size 1024
[  160.263814] The buggy address is located 64 bytes to the right of
[  160.263814]  1024-byte region [ffff888116163400, ffff888116163800)
[  160.277536] The buggy address belongs to the page:
[  160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160
[  160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0
[  160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)
[  160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0
[  160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000
[  160.327033] page dumped because: kasan: bad access detected
[  160.333270]
[  160.334937] Memory state around the buggy address:
[  160.356469] &gt;ffff888116163800: fc ..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47394" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unlink table before deleting it

syzbot reports following UAF:
BUG: KASAN: use-after-free in memcmp+0x18f/0x1c0 lib/string.c:955
 nla_strcmp+0xf2/0x130 lib/nlattr.c:836
 nft_table_lookup.part.0+0x1a2/0x460 net/netfilter/nf_tables_api.c:570
 nft_table_lookup net/netfilter/nf_tables_api.c:4064 [inline]
 nf_tables_getset+0x1b3/0x860 net/netfilter/nf_tables_api.c:4064
 nfnetlink_rcv_msg+0x659/0x13f0 net/netfilter/nfnetlink.c:285
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504

Problem is that all get operations are lockless, so the commit_mutex
held by nft_rcv_nl_event() isn't enough to stop a parallel GET request
from doing read-accesses to the table object even after synchronize_rcu().

To avoid this, unlink the table first and store the table objects in
on-stack scratch space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227906">SUSE bug 1227906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47395</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap

Limit max values for vht mcs and nss in ieee80211_parse_tx_radiotap
routine in order to fix the following warning reported by syzbot:

WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
Modules linked in:
CPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
RIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
RSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216
RAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000
RDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100
R10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8
R13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004
FS:  00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740
 netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089
 __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165
 __bpf_tx_skb net/core/filter.c:2114 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2139 [inline]
 __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162
 ____bpf_clone_redirect net/core/filter.c:2429 [inline]
 bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401
 bpf_prog_eeb6f53a69e5c6a2+0x59/0x234
 bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]
 __bpf_prog_run include/linux/filter.h:624 [inline]
 bpf_prog_run include/linux/filter.h:631 [inline]
 bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119
 bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663
 bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]
 __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47396</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47396" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211-hwsim: fix late beacon hrtimer handling

Thomas explained in https://lore.kernel.org/r/87mtoeb4hb.ffs@tglx
that our handling of the hrtimer here is wrong: If the timer fires
late (e.g. due to vCPU scheduling, as reported by Dmitry/syzbot)
then it tries to actually rearm the timer at the next deadline,
which might be in the past already:

 1          2          3          N          N+1
 |          |          |   ...    |          |

 ^ intended to fire here (1)
            ^ next deadline here (2)
                                      ^ actually fired here

The next time it fires, it's later, but will still try to schedule
for the next deadline (now 3), etc. until it catches up with N,
but that might take a long time, causing stalls etc.

Now, all of this is simulation, so we just have to fix it, but
note that the behaviour is wrong even per spec, since there's no
value then in sending all those beacons unaligned - they should be
aligned to the TBTT (1, 2, 3, ... in the picture), and if we're a
bit (or a lot) late, then just resume at that point.

Therefore, change the code to use hrtimer_forward_now() which will
ensure that the next firing of the timer would be at N+1 (in the
picture), i.e. the next interval point after the current time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47397</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47397" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb

We should always check if skb_header_pointer's return is NULL before
using it, otherwise it may cause null-ptr-deref, as syzbot reported:

  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]
  RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196
  Call Trace:
  &lt;IRQ&gt;
   sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109
   ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422
   ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463
   NF_HOOK include/linux/netfilter.h:307 [inline]
   NF_HOOK include/linux/netfilter.h:301 [inline]
   ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472
   dst_input include/net/dst.h:460 [inline]
   ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]
   NF_HOOK include/linux/netfilter.h:307 [inline]
   NF_HOOK include/linux/netfilter.h:301 [inline]
   ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47398</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47398" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hfi1: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long long' and printed with %llx.  Change %llx to %p to print the secured
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47399</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup

The ixgbe driver currently generates a NULL pointer dereference with
some machine (online cpus &lt; 63). This is due to the fact that the
maximum value of num_xdp_queues is nr_cpu_ids. Code is in
"ixgbe_set_rss_queues"".

Here's how the problem repeats itself:
Some machine (online cpus &lt; 63), And user set num_queues to 63 through
ethtool. Code is in the "ixgbe_set_channels",
	adapter-&gt;ring_feature[RING_F_FDIR].limit = count;

It becomes 63.

When user use xdp, "ixgbe_set_rss_queues" will set queues num.
	adapter-&gt;num_rx_queues = rss_i;
	adapter-&gt;num_tx_queues = rss_i;
	adapter-&gt;num_xdp_queues = ixgbe_xdp_queues(adapter);

And rss_i's value is from
	f = &amp;adapter-&gt;ring_feature[RING_F_FDIR];
	rss_i = f-&gt;indices = f-&gt;limit;

So "num_rx_queues" &gt; "num_xdp_queues", when run to "ixgbe_xdp_setup",
	for (i = 0; i &lt; adapter-&gt;num_rx_queues; i++)
		if (adapter-&gt;xdp_ring[i]-&gt;xsk_umem)

It leads to panic.

Call trace:
[exception RIP: ixgbe_xdp+368]
RIP: ffffffffc02a76a0  RSP: ffff9fe16202f8d0  RFLAGS: 00010297
RAX: 0000000000000000  RBX: 0000000000000020  RCX: 0000000000000000
RDX: 0000000000000000  RSI: 000000000000001c  RDI: ffffffffa94ead90
RBP: ffff92f8f24c0c18   R8: 0000000000000000   R9: 0000000000000000
R10: ffff9fe16202f830  R11: 0000000000000000  R12: ffff92f8f24c0000
R13: ffff9fe16202fc01  R14: 000000000000000a  R15: ffffffffc02a7530
ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc
 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808
 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235
10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384
11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd
12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb
13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88
14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319
15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290
16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8
17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64
18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9
19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c

So I fix ixgbe_max_channels so that it will not allow a setting of queues
to be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,
take the smaller value of num_rx_queues and num_xdp_queues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47400</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: do not allow call hns3_nic_net_open repeatedly

hns3_nic_net_open() is not allowed to called repeatly, but there
is no checking for this. When doing device reset and setup tc
concurrently, there is a small oppotunity to call hns3_nic_net_open
repeatedly, and cause kernel bug by calling napi_enable twice.

The calltrace information is like below:
[ 3078.222780] ------------[ cut here ]------------
[ 3078.230255] kernel BUG at net/core/dev.c:6991!
[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)
[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G           O      5.14.0-rc4+ #1
[ 3078.269102] Hardware name:  , BIOS KpxxxFPGA 1P B600 V181 08/12/2021
[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]
[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)
[ 3078.296168] pc : napi_enable+0x80/0x84
tc qdisc sho[w  3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]

[ 3078.314771] sp : ffff8000108abb20
[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300
[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000
[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880
[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000
[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930
[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4
[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8
[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344
[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938
[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0
[ 3078.414657] Call trace:
[ 3078.418517]  napi_enable+0x80/0x84
[ 3078.424626]  hns3_reset_notify_up_enet+0x78/0xd0 [hns3]
[ 3078.433469]  hns3_reset_notify+0x64/0x80 [hns3]
[ 3078.441430]  hclge_notify_client+0x68/0xb0 [hclge]
[ 3078.450511]  hclge_reset_rebuild+0x524/0x884 [hclge]
[ 3078.458879]  hclge_reset_service_task+0x3c4/0x680 [hclge]
[ 3078.467470]  hclge_service_task+0xb0/0xb54 [hclge]
[ 3078.475675]  process_one_work+0x1dc/0x48c
[ 3078.481888]  worker_thread+0x15c/0x464
[ 3078.487104]  kthread+0x160/0x170
[ 3078.492479]  ret_from_fork+0x10/0x18
[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)
[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---

Once hns3_nic_net_open() is excute success, the flag
HNS3_NIC_STATE_DOWN will be cleared. So add checking for this
flag, directly return when HNS3_NIC_STATE_DOWN is no set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47401</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix stack information leak

The tty driver name is used also after registering the driver and must
specifically not be allocated on the stack to avoid leaking information
to user space (or triggering an oops).

Drivers should not try to encode topology information in the tty device
name but this one snuck in through staging without anyone noticing and
another driver has since copied this malpractice.

Fixing the ABI is a separate issue, but this at least plugs the security
hole.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47402</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: flower: protect fl_walk() with rcu

Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul()
also removed rcu protection of individual filters which causes following
use-after-free when filter is deleted concurrently. Fix fl_walk() to obtain
rcu read lock while iterating and taking the filter reference and temporary
release the lock while calling arg-&gt;fn() callback that can sleep.

KASAN trace:

[  352.773640] ==================================================================
[  352.775041] BUG: KASAN: use-after-free in fl_walk+0x159/0x240 [cls_flower]
[  352.776304] Read of size 4 at addr ffff8881c8251480 by task tc/2987

[  352.777862] CPU: 3 PID: 2987 Comm: tc Not tainted 5.15.0-rc2+ #2
[  352.778980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  352.781022] Call Trace:
[  352.781573]  dump_stack_lvl+0x46/0x5a
[  352.782332]  print_address_description.constprop.0+0x1f/0x140
[  352.783400]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.784292]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.785138]  kasan_report.cold+0x83/0xdf
[  352.785851]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.786587]  kasan_check_range+0x145/0x1a0
[  352.787337]  fl_walk+0x159/0x240 [cls_flower]
[  352.788163]  ? fl_put+0x10/0x10 [cls_flower]
[  352.789007]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.790102]  tcf_chain_dump+0x231/0x450
[  352.790878]  ? tcf_chain_tp_delete_empty+0x170/0x170
[  352.791833]  ? __might_sleep+0x2e/0xc0
[  352.792594]  ? tfilter_notify+0x170/0x170
[  352.793400]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.794477]  tc_dump_tfilter+0x385/0x4b0
[  352.795262]  ? tc_new_tfilter+0x1180/0x1180
[  352.796103]  ? __mod_node_page_state+0x1f/0xc0
[  352.796974]  ? __build_skb_around+0x10e/0x130
[  352.797826]  netlink_dump+0x2c0/0x560
[  352.798563]  ? netlink_getsockopt+0x430/0x430
[  352.799433]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.800542]  __netlink_dump_start+0x356/0x440
[  352.801397]  rtnetlink_rcv_msg+0x3ff/0x550
[  352.802190]  ? tc_new_tfilter+0x1180/0x1180
[  352.802872]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  352.803668]  ? tc_new_tfilter+0x1180/0x1180
[  352.804344]  ? _copy_from_iter_nocache+0x800/0x800
[  352.805202]  ? kasan_set_track+0x1c/0x30
[  352.805900]  netlink_rcv_skb+0xc6/0x1f0
[  352.806587]  ? rht_deferred_worker+0x6b0/0x6b0
[  352.807455]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  352.808324]  ? netlink_ack+0x4d0/0x4d0
[  352.809086]  ? netlink_deliver_tap+0x62/0x3d0
[  352.809951]  netlink_unicast+0x353/0x480
[  352.810744]  ? netlink_attachskb+0x430/0x430
[  352.811586]  ? __alloc_skb+0xd7/0x200
[  352.812349]  netlink_sendmsg+0x396/0x680
[  352.813132]  ? netlink_unicast+0x480/0x480
[  352.813952]  ? __import_iovec+0x192/0x210
[  352.814759]  ? netlink_unicast+0x480/0x480
[  352.815580]  sock_sendmsg+0x6c/0x80
[  352.816299]  ____sys_sendmsg+0x3a5/0x3c0
[  352.817096]  ? kernel_sendmsg+0x30/0x30
[  352.817873]  ? __ia32_sys_recvmmsg+0x150/0x150
[  352.818753]  ___sys_sendmsg+0xd8/0x140
[  352.819518]  ? sendmsg_copy_msghdr+0x110/0x110
[  352.820402]  ? ___sys_recvmsg+0xf4/0x1a0
[  352.821110]  ? __copy_msghdr_from_user+0x260/0x260
[  352.821934]  ? _raw_spin_lock+0x81/0xd0
[  352.822680]  ? __handle_mm_fault+0xef3/0x1b20
[  352.823549]  ? rb_insert_color+0x2a/0x270
[  352.824373]  ? copy_page_range+0x16b0/0x16b0
[  352.825209]  ? perf_event_update_userpage+0x2d0/0x2d0
[  352.826190]  ? __fget_light+0xd9/0xf0
[  352.826941]  __sys_sendmsg+0xb3/0x130
[  352.827613]  ? __sys_sendmsg_sock+0x20/0x20
[  352.828377]  ? do_user_addr_fault+0x2c5/0x8a0
[  352.829184]  ? fpregs_assert_state_consistent+0x52/0x60
[  352.830001]  ? exit_to_user_mode_prepare+0x32/0x160
[  352.830845]  do_syscall_64+0x35/0x80
[  352.831445]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  352.832331] RIP: 0033:0x7f7bee973c17
[ 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225302">SUSE bug 1225302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47403</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47403" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix module reference leak

A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.

Fix this by taking the module reference and initialising the tty driver
data when installing the tty.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47404</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47404" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: betop: fix slab-out-of-bounds Write in betop_probe

Syzbot reported slab-out-of-bounds Write bug in hid-betopff driver.
The problem is the driver assumes the device must have an input report but
some malicious devices violate this assumption.

So this patch checks hid_device's input is non empty before it's been used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47405</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: free raw_report buffers in usbhid_stop

Free the unsent raw_report buffers when the device is removed.

Fixes a memory leak reported by syzbot at:
https://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47406</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47406" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add error checking to ext4_ext_replay_set_iblocks()

If the call to ext4_map_blocks() fails due to an corrupted file
system, ext4_ext_replay_set_iblocks() can get stuck in an infinite
loop.  This could be reproduced by running generic/526 with a file
system that has inline_data and fast_commit enabled.  The system will
repeatedly log to the console:

EXT4-fs warning (device dm-3): ext4_block_to_path:105: block 1074800922 &gt; max in inode 131076

and the stack that it gets stuck in is:

   ext4_block_to_path+0xe3/0x130
   ext4_ind_map_blocks+0x93/0x690
   ext4_map_blocks+0x100/0x660
   skip_hole+0x47/0x70
   ext4_ext_replay_set_iblocks+0x223/0x440
   ext4_fc_replay_inode+0x29e/0x3b0
   ext4_fc_replay+0x278/0x550
   do_one_pass+0x646/0xc10
   jbd2_journal_recover+0x14a/0x270
   jbd2_journal_load+0xc4/0x150
   ext4_load_journal+0x1f3/0x490
   ext4_fill_super+0x22d4/0x2c00

With this patch, generic/526 still fails, but system is no longer
locking up in a tight loop.  It's likely the root casue is that
fast_commit replay is corrupting file systems with inline_data, and we
probably need to add better error handling in the fast commit replay
code path beyond what is done here, which essentially just breaks the
infinite loop without reporting the to the higher levels of the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47407</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47407" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Handle SRCU initialization failure during page track init

Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism.  Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.

[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47408</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47408" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: serialize hash resizes and cleanups

Syzbot was able to trigger the following warning [1]

No repro found by syzbot yet but I was able to trigger similar issue
by having 2 scripts running in parallel, changing conntrack hash sizes,
and:

for j in `seq 1 1000` ; do unshare -n /bin/true &gt;/dev/null ; done

It would take more than 5 minutes for net_namespace structures
to be cleaned up.

This is because nf_ct_iterate_cleanup() has to restart everytime
a resize happened.

By adding a mutex, we can serialize hash resizes and cleanups
and also make get_next_corpse() faster by skipping over empty
buckets.

Even without resizes in the picture, this patch considerably
speeds up network namespace dismantles.

[1]
INFO: task syz-executor.0:8312 can't die for more than 144 seconds.
task:syz-executor.0  state:R  running task     stack:25672 pid: 8312 ppid:  6573 flags:0x00004006
Call Trace:
 context_switch kernel/sched/core.c:4955 [inline]
 __schedule+0x940/0x26f0 kernel/sched/core.c:6236
 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6408
 preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:35
 __local_bh_enable_ip+0x109/0x120 kernel/softirq.c:390
 local_bh_enable include/linux/bottom_half.h:32 [inline]
 get_next_corpse net/netfilter/nf_conntrack_core.c:2252 [inline]
 nf_ct_iterate_cleanup+0x15a/0x450 net/netfilter/nf_conntrack_core.c:2275
 nf_conntrack_cleanup_net_list+0x14c/0x4f0 net/netfilter/nf_conntrack_core.c:2469
 ops_exit_list+0x10d/0x160 net/core/net_namespace.c:171
 setup_net+0x639/0xa30 net/core/net_namespace.c:349
 copy_net_ns+0x319/0x760 net/core/net_namespace.c:470
 create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0xc1/0x1f0 kernel/nsproxy.c:226
 ksys_unshare+0x445/0x920 kernel/fork.c:3128
 __do_sys_unshare kernel/fork.c:3202 [inline]
 __se_sys_unshare kernel/fork.c:3200 [inline]
 __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3200
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f63da68e739
RSP: 002b:00007f63d7c05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f63da792f80 RCX: 00007f63da68e739
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f63da6e8cc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63da792f80
R13: 00007fff50b75d3f R14: 00007f63d7c05300 R15: 0000000000022000

Showing all locks held in the system:
1 lock held by khungtaskd/27:
 #0: ffffffff8b980020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446
2 locks held by kworker/u4:2/153:
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268
 #1: ffffc9000140fdb0 ((kfence_timer).work){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272
1 lock held by systemd-udevd/2970:
1 lock held by in:imklog/6258:
 #0: ffff88807f970ff0 (&amp;f-&gt;f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
3 locks held by kworker/1:6/8158:
1 lock held by syz-executor.0/8312:
2 locks held by kworker/u4:13/9320:
1 lock held by
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47409</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47409" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47410</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47410" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix svm_migrate_fini warning

Device manager releases device-specific resources when a driver
disconnects from a device, devm_memunmap_pages and
devm_release_mem_region calls in svm_migrate_fini are redundant.

It causes below warning trace after patch "drm/amdgpu: Split
amdgpu_device_fini into early and late", so remove function
svm_migrate_fini.

BUG: https://gitlab.freedesktop.org/drm/amd/-/issues/1718

WARNING: CPU: 1 PID: 3646 at drivers/base/devres.c:795
devm_release_action+0x51/0x60
Call Trace:
    ? memunmap_pages+0x360/0x360
    svm_migrate_fini+0x2d/0x60 [amdgpu]
    kgd2kfd_device_exit+0x23/0xa0 [amdgpu]
    amdgpu_amdkfd_device_fini_sw+0x1d/0x30 [amdgpu]
    amdgpu_device_fini_sw+0x45/0x290 [amdgpu]
    amdgpu_driver_release_kms+0x12/0x30 [amdgpu]
    drm_dev_release+0x20/0x40 [drm]
    release_nodes+0x196/0x1e0
    device_release_driver_internal+0x104/0x1d0
    driver_detach+0x47/0x90
    bus_remove_driver+0x7a/0xd0
    pci_unregister_driver+0x3d/0x90
    amdgpu_exit+0x11/0x20 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47412</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47412" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't call rq_qos_ops-&gt;done_bio if the bio isn't tracked

rq_qos framework is only applied on request based driver, so:

1) rq_qos_done_bio() needn't to be called for bio based driver

2) rq_qos_done_bio() needn't to be called for bio which isn't tracked,
such as bios ended from error handling code.

Especially in bio_endio():

1) request queue is referred via bio-&gt;bi_bdev-&gt;bd_disk-&gt;queue, which
may be gone since request queue refcount may not be held in above two
cases

2) q-&gt;rq_qos may be freed in blk_cleanup_queue() when calling into
__rq_qos_done_bio()

Fix the potential kernel panic by not calling rq_qos_ops-&gt;done_bio if
the bio isn't tracked. This way is safe because both ioc_rqos_done_bio()
and blkcg_iolatency_done_bio() are nop if the bio isn't tracked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47413</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47413" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle

When passing 'phys' in the devicetree to describe the USB PHY phandle
(which is the recommended way according to
Documentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the
following NULL pointer dereference is observed on i.MX7 and i.MX8MM:

[    1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098
[    1.498170] Mem abort info:
[    1.500966]   ESR = 0x96000044
[    1.504030]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.509356]   SET = 0, FnV = 0
[    1.512416]   EA = 0, S1PTW = 0
[    1.515569]   FSC = 0x04: level 0 translation fault
[    1.520458] Data abort info:
[    1.523349]   ISV = 0, ISS = 0x00000044
[    1.527196]   CM = 0, WnR = 1
[    1.530176] [0000000000000098] user address but active_mm is swapper
[    1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[    1.542125] Modules linked in:
[    1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3
[    1.551901] Hardware name: Kontron i.MX8MM N801X S (DT)
[    1.557133] Workqueue: events_unbound deferred_probe_work_func
[    1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)
[    1.568998] pc : imx7d_charger_detection+0x3f0/0x510
[    1.573973] lr : imx7d_charger_detection+0x22c/0x510

This happens because the charger functions check for the phy presence
inside the imx_usbmisc_data structure (data-&gt;usb_phy), but the chipidea
core populates the usb_phy passed via 'phys' inside 'struct ci_hdrc'
(ci-&gt;usb_phy) instead.

This causes the NULL pointer dereference inside imx7d_charger_detection().

Fix it by also searching for 'phys' in case 'fsl,usbphy' is not found.

Tested on a imx7s-warp board.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47414</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47414" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Flush current cpu icache before other cpus

On SiFive Unmatched, I recently fell onto the following BUG when booting:

[    0.000000] ftrace: allocating 36610 entries in 144 pages
[    0.000000] Oops - illegal instruction [#1]
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.13.1+ #5
[    0.000000] Hardware name: SiFive HiFive Unmatched A00 (DT)
[    0.000000] epc : riscv_cpuid_to_hartid_mask+0x6/0xae
[    0.000000]  ra : __sbi_rfence_v02+0xc8/0x10a
[    0.000000] epc : ffffffff80007240 ra : ffffffff80009964 sp : ffffffff81803e10
[    0.000000]  gp : ffffffff81a1ea70 tp : ffffffff8180f500 t0 : ffffffe07fe30000
[    0.000000]  t1 : 0000000000000004 t2 : 0000000000000000 s0 : ffffffff81803e60
[    0.000000]  s1 : 0000000000000000 a0 : ffffffff81a22238 a1 : ffffffff81803e10
[    0.000000]  a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
[    0.000000]  a5 : 0000000000000000 a6 : ffffffff8000989c a7 : 0000000052464e43
[    0.000000]  s2 : ffffffff81a220c8 s3 : 0000000000000000 s4 : 0000000000000000
[    0.000000]  s5 : 0000000000000000 s6 : 0000000200000100 s7 : 0000000000000001
[    0.000000]  s8 : ffffffe07fe04040 s9 : ffffffff81a22c80 s10: 0000000000001000
[    0.000000]  s11: 0000000000000004 t3 : 0000000000000001 t4 : 0000000000000008
[    0.000000]  t5 : ffffffcf04000808 t6 : ffffffe3ffddf188
[    0.000000] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000002
[    0.000000] [&lt;ffffffff80007240&gt;] riscv_cpuid_to_hartid_mask+0x6/0xae
[    0.000000] [&lt;ffffffff80009474&gt;] sbi_remote_fence_i+0x1e/0x26
[    0.000000] [&lt;ffffffff8000b8f4&gt;] flush_icache_all+0x12/0x1a
[    0.000000] [&lt;ffffffff8000666c&gt;] patch_text_nosync+0x26/0x32
[    0.000000] [&lt;ffffffff8000884e&gt;] ftrace_init_nop+0x52/0x8c
[    0.000000] [&lt;ffffffff800f051e&gt;] ftrace_process_locs.isra.0+0x29c/0x360
[    0.000000] [&lt;ffffffff80a0e3c6&gt;] ftrace_init+0x80/0x130
[    0.000000] [&lt;ffffffff80a00f8c&gt;] start_kernel+0x5c4/0x8f6
[    0.000000] ---[ end trace f67eb9af4d8d492b ]---
[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

While ftrace is looping over a list of addresses to patch, it always failed
when patching the same function: riscv_cpuid_to_hartid_mask. Looking at the
backtrace, the illegal instruction is encountered in this same function.
However, patch_text_nosync, after patching the instructions, calls
flush_icache_range. But looking at what happens in this function:

flush_icache_range -&gt; flush_icache_all
                   -&gt; sbi_remote_fence_i
                   -&gt; __sbi_rfence_v02
                   -&gt; riscv_cpuid_to_hartid_mask

The icache and dcache of the current cpu are never synchronized between the
patching of riscv_cpuid_to_hartid_mask and calling this same function.

So fix this by flushing the current cpu's icache before asking for the other
cpus to do the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47415</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47415" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mvm: Fix possible NULL dereference

In __iwl_mvm_remove_time_event() check that 'te_data-&gt;vif' is NULL
before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47416</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: mdio: fix memory leak

Syzbot reported memory leak in MDIO bus interface, the problem was in
wrong state logic.

MDIOBUS_ALLOCATED indicates 2 states:
	1. Bus is only allocated
	2. Bus allocated and __mdiobus_register() fails, but
	   device_register() was called

In case of device_register() has been called we should call put_device()
to correctly free the memory allocated for this device, but mdiobus_free()
calls just kfree(dev) in case of MDIOBUS_ALLOCATED state

To avoid this behaviour we need to set bus-&gt;state to MDIOBUS_UNREGISTERED
_before_ calling device_register(), because put_device() should be
called even in case of device_register() failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47417</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47417" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libbpf: Fix memory leak in strset

Free struct strset itself, not just its internal parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47418</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47418" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: fix NULL deref in fifo_set_limit()

syzbot reported another NULL deref in fifo_set_limit() [1]

I could repro the issue with :

unshare -n
tc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit
tc qd replace dev lo parent 1:0 pfifo_fast
tc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit

pfifo_fast does not have a change() operation.
Make fifo_set_limit() more robust about this.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000
RBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947
R10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910
R13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800
FS:  00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 fifo_set_limit net/sched/sch_fifo.c:242 [inline]
 fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227
 tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418
 qdisc_change net/sched/sch_api.c:1332 [inline]
 tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47419</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_taprio: properly cancel timer from taprio_destroy()

There is a comment in qdisc_create() about us not calling ops-&gt;reset()
in some cases.

err_out4:
	/*
	 * Any broken qdiscs that would require a ops-&gt;reset() here?
	 * The qdisc was never in action so it shouldn't be necessary.
	 */

As taprio sets a timer before actually receiving a packet, we need
to cancel it from ops-&gt;destroy, just in case ops-&gt;reset has not
been called.

syzbot reported:

ODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22
WARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Modules linked in:
CPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 &lt;0f&gt; 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3
RSP: 0018:ffffc9000130f330 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000
RDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020
R13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000
FS:  0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __debug_check_no_obj_freed lib/debugobjects.c:987 [inline]
 debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018
 slab_free_hook mm/slub.c:1603 [inline]
 slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653
 slab_free mm/slub.c:3213 [inline]
 kfree+0xe4/0x540 mm/slub.c:4267
 qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299
 tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2457
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47420</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47420" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix a potential ttm-&gt;sg memory leak

Memory is allocated for ttm-&gt;sg by kmalloc in kfd_mem_dmamap_userptr,
but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47421</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47421" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume

In current code, when a PCI error state pci_channel_io_normal is detectd,
it will report PCI_ERS_RESULT_CAN_RECOVER status to PCI driver, and PCI
driver will continue the execution of PCI resume callback report_resume by
pci_walk_bridge, and the callback will go into amdgpu_pci_resume
finally, where write lock is releasd unconditionally without acquiring
such lock first. In this case, a deadlock will happen when other threads
start to acquire the read lock.

To fix this, add a member in amdgpu_device strucutre to cache
pci_channel_state, and only continue the execution in amdgpu_pci_resume
when it's pci_channel_io_frozen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47422</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47422" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/kms/nv50-: fix file release memory leak

When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47423</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47423" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/debugfs: fix file release memory leak

When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47424</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47424" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix freeing of uninitialized misc IRQ vector

When VSI set up failed in i40e_probe() as part of PF switch set up
driver was trying to free misc IRQ vectors in
i40e_clear_interrupt_scheme and produced a kernel Oops:

   Trying to free already-free IRQ 266
   WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300
   Workqueue: events work_for_cpu_fn
   RIP: 0010:__free_irq+0x9a/0x300
   Call Trace:
   ? synchronize_irq+0x3a/0xa0
   free_irq+0x2e/0x60
   i40e_clear_interrupt_scheme+0x53/0x190 [i40e]
   i40e_probe.part.108+0x134b/0x1a40 [i40e]
   ? kmem_cache_alloc+0x158/0x1c0
   ? acpi_ut_update_ref_count.part.1+0x8e/0x345
   ? acpi_ut_update_object_reference+0x15e/0x1e2
   ? strstr+0x21/0x70
   ? irq_get_irq_data+0xa/0x20
   ? mp_check_pin_attr+0x13/0xc0
   ? irq_get_irq_data+0xa/0x20
   ? mp_map_pin_to_irq+0xd3/0x2f0
   ? acpi_register_gsi_ioapic+0x93/0x170
   ? pci_conf1_read+0xa4/0x100
   ? pci_bus_read_config_word+0x49/0x70
   ? do_pci_enable_device+0xcc/0x100
   local_pci_probe+0x41/0x90
   work_for_cpu_fn+0x16/0x20
   process_one_work+0x1a7/0x360
   worker_thread+0x1cf/0x390
   ? create_worker+0x1a0/0x1a0
   kthread+0x112/0x130
   ? kthread_flush_work_fn+0x10/0x10
   ret_from_fork+0x1f/0x40

The problem is that at that point misc IRQ vectors
were not allocated yet and we get a call trace
that driver is trying to free already free IRQ vectors.

Add a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED
PF state before calling i40e_free_misc_vector. This state is set only if
misc IRQ vectors were properly initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47425</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47425" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: acpi: fix resource leak in reconfiguration device addition

acpi_i2c_find_adapter_by_handle() calls bus_find_device() which takes a
reference on the adapter which is never released which will result in a
reference count leak and render the adapter unremovable.  Make sure to
put the adapter after creating the client in the same manner that we do
for OF.

[wsa: fixed title]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47426</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47426" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, s390: Fix potential memory leak about jit_data

Make sure to free jit_data through kfree() in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47427</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47427" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: Fix iscsi_task use after free

Commit d39df158518c ("scsi: iscsi: Have abort handler get ref to conn")
added iscsi_get_conn()/iscsi_put_conn() calls during abort handling but
then also changed the handling of the case where we detect an already
completed task where we now end up doing a goto to the common put/cleanup
code. This results in a iscsi_task use after free, because the common
cleanup code will do a put on the iscsi_task.

This reverts the goto and moves the iscsi_get_conn() to after we've checked
if the iscsi_task is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47428</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47428" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: fix program check interrupt emergency stack path

Emergency stack path was jumping into a 3: label inside the
__GEN_COMMON_BODY macro for the normal path after it had finished,
rather than jumping over it. By a small miracle this is the correct
place to build up a new interrupt frame with the existing stack
pointer, so things basically worked okay with an added weird looking
700 trap frame on top (which had the wrong -&gt;nip so it didn't decode
bug messages either).

Fix this by avoiding using numeric labels when jumping over non-trivial
macros.

Before:

 LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
 Modules linked in:
 CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637
 NIP:  7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0
 REGS: c0000000fffb3a50 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 00000700  XER: 20040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006c964 c0000000fffb3cf0 c000000001513800 0000000000000000
 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
 NIP [7265677368657265] 0x7265677368657265
 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
 Call Trace:
 [c0000000fffb3cf0] [c00000000000bdac] soft_nmi_common+0x13c/0x1d0 (unreliable)
 --- interrupt: 700 at decrementer_common_virt+0xb8/0x230
 NIP:  c0000000000098b8 LR: c00000000006c0c8 CTR: c0000000000097f0
 REGS: c0000000fffb3d60 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 22424282  XER: 20040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006c964 0000000000002400 c000000001513800 0000000000000000
 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
 NIP [c0000000000098b8] decrementer_common_virt+0xb8/0x230
 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
 --- interrupt: 700
 Instruction dump:
 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
 ---[ end trace 6d28218e0cc3c949 ]---

After:

 ------------[ cut here ]------------
 kernel BUG at arch/powerpc/kernel/exceptions-64s.S:491!
 Oops: Exception in kernel mode, sig: 5 [#1]
 LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
 Modules linked in:
 CPU: 0 PID: 88 Comm: login Not tainted 5.15.0-rc2-00034-ge057cdade6e5-dirty #2638
 NIP:  c0000000000098b8 LR: c00000000006bf04 CTR: c0000000000097f0
 REGS: c0000000fffb3d60 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 24482227  XER: 00040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006bf04 0000000000002400 c000000001513800 c000000001271868
 GPR04: 00000000100f0d29 0000000042000000 0000000000000007 0000000000000009
 GPR08: 00000000100f0d29 0000000024482227 0000000000002710 c000000000181b3c
 GPR12: 9000000000009033 c0000000016b0000 00000000100f0d29 c000000005b22f00
 GPR16: 00000000ffff0000 0000000000000001 0000000000000009 00000000100eed90
 GPR20: 00000000100eed90 00000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47429</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47429" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: Fix unrecoverable MCE calling async handler from NMI

The machine check handler is not considered NMI on 64s. The early
handler is the true NMI handler, and then it schedules the
machine_check_exception handler to run when interrupts are enabled.

This works fine except the case of an unrecoverable MCE, where the true
NMI is taken when MSR[RI] is clear, it can not recover, so it calls
machine_check_exception directly so something might be done about it.

Calling an async handler from NMI context can result in irq state and
other things getting corrupted. This can also trigger the BUG at
  arch/powerpc/include/asm/interrupt.h:168
  BUG_ON(!arch_irq_disabled_regs(regs) &amp;&amp; !(regs-&gt;msr &amp; MSR_EE));

Fix this by making an _async version of the handler which is called
in the normal case, and a NMI version that is called for unrecoverable
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227553">SUSE bug 1227553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47430</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47430" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n

Commit

  3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks")

added a warning if AC is set when in the kernel.

Commit

  662a0221893a3d ("x86/entry: Fix AC assertion")

changed the warning to only fire if the CPU supports SMAP.

However, the warning can still trigger on a machine that supports SMAP
but where it's disabled in the kernel config and when running the
syscall_nt selftest, for example:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 49 at irqentry_enter_from_user_mode
  CPU: 0 PID: 49 Comm: init Tainted: G                T 5.15.0-rc4+ #98 e6202628ee053b4f310759978284bd8bb0ce6905
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
  RIP: 0010:irqentry_enter_from_user_mode
  ...
  Call Trace:
   ? irqentry_enter
   ? exc_general_protection
   ? asm_exc_general_protection
   ? asm_exc_general_protectio

IS_ENABLED(CONFIG_X86_SMAP) could be added to the warning condition, but
even this would not be enough in case SMAP is disabled at boot time with
the "nosmap" parameter.

To be consistent with "nosmap" behaviour, clear X86_FEATURE_SMAP when
!CONFIG_X86_SMAP.

Found using entry-fuzz + satrandconfig.

 [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47431</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47431" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix gart.bo pin_count leak

gmc_v{9,10}_0_gart_disable() isn't called matched with
correspoding gart_enbale function in SRIOV case. This will
lead to gart.bo pin_count leak on driver unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47432</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47432" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/generic-radix-tree.c: Don't overflow in peek()

When we started spreading new inode numbers throughout most of the 64
bit inode space, that triggered some corner case bugs, in particular
some integer overflows related to the radix tree code. Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225391">SUSE bug 1225391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47433</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47433" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix abort logic in btrfs_replace_file_extents

Error injection testing uncovered a case where we'd end up with a
corrupt file system with a missing extent in the middle of a file.  This
occurs because the if statement to decide if we should abort is wrong.

The only way we would abort in this case is if we got a ret !=
-EOPNOTSUPP and we called from the file clone code.  However the
prealloc code uses this path too.  Instead we need to abort if there is
an error, and the only error we _don't_ abort on is -EOPNOTSUPP and only
if we came from the clone file code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47434</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47434" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix command ring pointer corruption while aborting a command

The command ring pointer is located at [6:63] bits of the command
ring control register (CRCR). All the control bits like command stop,
abort are located at [0:3] bits. While aborting a command, we read the
CRCR and set the abort bit and write to the CRCR. The read will always
give command ring pointer as all zeros. So we essentially write only
the control bits. Since we split the 64 bit write into two 32 bit writes,
there is a possibility of xHC command ring stopped before the upper
dword (all zeros) is written. If that happens, xHC updates the upper
dword of its internal command ring pointer with all zeros. Next time,
when the command ring is restarted, we see xHC memory access failures.
Fix this issue by only writing to the lower dword of CRCR where all
control bits are located.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47435</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47435" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix mempool NULL pointer race when completing IO

dm_io_dec_pending() calls end_io_acct() first and will then dec md
in-flight pending count. But if a task is swapping DM table at same
time this can result in a crash due to mempool-&gt;elements being NULL:

task1                             task2
do_resume
 -&gt;do_suspend
  -&gt;dm_wait_for_completion
                                  bio_endio
				   -&gt;clone_endio
				    -&gt;dm_io_dec_pending
				     -&gt;end_io_acct
				      -&gt;wakeup task1
 -&gt;dm_swap_table
  -&gt;__bind
   -&gt;__bind_mempools
    -&gt;bioset_exit
     -&gt;mempool_exit
                                     -&gt;free_io

[ 67.330330] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
......
[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)
[ 67.330510] pc : mempool_free+0x70/0xa0
[ 67.330515] lr : mempool_free+0x4c/0xa0
[ 67.330520] sp : ffffff8008013b20
[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004
[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8
[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800
[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800
[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80
[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c
[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd
[ 67.330563] x15: 000000000093b41e x14: 0000000000000010
[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555
[ 67.330574] x11: 0000000000000001 x10: 0000000000000001
[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000
[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a
[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001
[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8
[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970
[ 67.330609] Call trace:
[ 67.330616] mempool_free+0x70/0xa0
[ 67.330627] bio_put+0xf8/0x110
[ 67.330638] dec_pending+0x13c/0x230
[ 67.330644] clone_endio+0x90/0x180
[ 67.330649] bio_endio+0x198/0x1b8
[ 67.330655] dec_pending+0x190/0x230
[ 67.330660] clone_endio+0x90/0x180
[ 67.330665] bio_endio+0x198/0x1b8
[ 67.330673] blk_update_request+0x214/0x428
[ 67.330683] scsi_end_request+0x2c/0x300
[ 67.330688] scsi_io_completion+0xa0/0x710
[ 67.330695] scsi_finish_command+0xd8/0x110
[ 67.330700] scsi_softirq_done+0x114/0x148
[ 67.330708] blk_done_softirq+0x74/0xd0
[ 67.330716] __do_softirq+0x18c/0x374
[ 67.330724] irq_exit+0xb4/0xb8
[ 67.330732] __handle_domain_irq+0x84/0xc0
[ 67.330737] gic_handle_irq+0x148/0x1b0
[ 67.330744] el1_irq+0xe8/0x190
[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538
[ 67.330759] cpuidle_enter_state+0x1fc/0x398
[ 67.330764] cpuidle_enter+0x18/0x20
[ 67.330772] do_idle+0x1b4/0x290
[ 67.330778] cpu_startup_entry+0x20/0x28
[ 67.330786] secondary_start_kernel+0x160/0x170

Fix this by:
1) Establishing pointers to 'struct dm_io' members in
dm_io_dec_pending() so that they may be passed into end_io_acct()
_after_ free_io() is called.
2) Moving end_io_acct() after free_io().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47436</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47436" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: dsps: Fix the probe error path

Commit 7c75bde329d7 ("usb: musb: musb_dsps: request_irq() after
initializing musb") has inverted the calls to
dsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without
updating correctly the error path. dsps_create_musb_pdev() allocates and
registers a new platform device which must be unregistered and freed
with platform_device_unregister(), and this is missing upon
dsps_setup_optional_vbus_irq() error.

While on the master branch it seems not to trigger any issue, I observed
a kernel crash because of a NULL pointer dereference with a v5.10.70
stable kernel where the patch mentioned above was backported. With this
kernel version, -EPROBE_DEFER is returned the first time
dsps_setup_optional_vbus_irq() is called which triggers the probe to
error out without unregistering the platform device. Unfortunately, on
the Beagle Bone Black Wireless, the platform device still living in the
system is being used by the USB Ethernet gadget driver, which during the
boot phase triggers the crash.

My limited knowledge of the musb world prevents me to revert this commit
which was sent to silence a robot warning which, as far as I understand,
does not make sense. The goal of this patch was to prevent an IRQ to
fire before the platform device being registered. I think this cannot
ever happen due to the fact that enabling the interrupts is done by the
-&gt;enable() callback of the platform musb device, and this platform
device must be already registered in order for the core or any other
user to use this callback.

Hence, I decided to fix the error path, which might prevent future
errors on mainline kernels while also fixing older ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47437</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47437" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adis16475: fix deadlock on frequency set

With commit 39c024b51b560
("iio: adis16475: improve sync scale mode handling"), two deadlocks were
introduced:
 1) The call to 'adis_write_reg_16()' was not changed to it's unlocked
    version.
 2) The lock was not being released on the success path of the function.

This change fixes both these issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47438</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47438" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path

Prior to this patch in case mlx5_core_destroy_cq() failed it returns
without completing all destroy operations and that leads to memory leak.
Instead, complete the destroy flow before return error.

Also move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()
to be symmetrical with mlx5_core_create_cq().

kmemleak complains on:

unreferenced object 0xc000000038625100 (size 64):
  comm "ethtool", pid 28301, jiffies 4298062946 (age 785.380s)
  hex dump (first 32 bytes):
    60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0  `.H.......4.....
    02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0  ..........}.....
  backtrace:
    [&lt;000000009e8643cb&gt;] add_res_tree+0xd0/0x270 [mlx5_core]
    [&lt;00000000e7cb8e6c&gt;] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]
    [&lt;000000002a12918f&gt;] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]
    [&lt;00000000cef0a696&gt;] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]
    [&lt;000000009c642c26&gt;] mlx5e_open_cq+0xb4/0x130 [mlx5_core]
    [&lt;0000000058dfa578&gt;] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]
    [&lt;0000000081839561&gt;] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]
    [&lt;0000000009cf05d4&gt;] mlx5e_switch_priv_channels+0xa4/0x230
[mlx5_core]
    [&lt;0000000042bbedd8&gt;] mlx5e_safe_switch_params+0x14c/0x300
[mlx5_core]
    [&lt;0000000004bc9db8&gt;] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]
    [&lt;00000000a0553443&gt;] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]
    [&lt;00000000a8f3d84b&gt;] ethnl_set_privflags+0x234/0x2d0
    [&lt;00000000fd27f27c&gt;] genl_family_rcv_msg_doit+0x108/0x1d0
    [&lt;00000000f495e2bb&gt;] genl_family_rcv_msg+0xe4/0x1f0
    [&lt;00000000646c5c2c&gt;] genl_rcv_msg+0x78/0x120
    [&lt;00000000d53e384e&gt;] netlink_rcv_skb+0x74/0x1a0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47439</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47439" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work

When the ksz module is installed and removed using rmmod, kernel crashes
with null pointer dereferrence error. During rmmod, ksz_switch_remove
function tries to cancel the mib_read_workqueue using
cancel_delayed_work_sync routine and unregister switch from dsa.

During dsa_unregister_switch it calls ksz_mac_link_down, which in turn
reschedules the workqueue since mib_interval is non-zero.
Due to which queue executed after mib_interval and it tries to access
dp-&gt;slave. But the slave is unregistered in the ksz_switch_remove
function. Hence kernel crashes.

To avoid this crash, before canceling the workqueue, resetted the
mib_interval to 0.

v1 -&gt; v2:
-Removed the if condition in ksz_mib_read_work
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47440</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47440" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: encx24j600: check error in devm_regmap_init_encx24j600

devm_regmap_init may return error which caused by like out of memory,
this will results in null pointer dereference later when reading
or writing register:

general protection fault in encx24j600_spi_probe
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
CPU: 0 PID: 286 Comm: spi-encx24j600- Not tainted 5.15.0-rc2-00142-g9978db750e31-dirty #11 9c53a778c1306b1b02359f3c2bbedc0222cba652
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:regcache_cache_bypass drivers/base/regmap/regcache.c:540
Code: 54 41 89 f4 55 53 48 89 fb 48 83 ec 08 e8 26 94 a8 fe 48 8d bb a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4a 03 00 00 4c 8d ab b0 00 00 00 48 8b ab a0 00
RSP: 0018:ffffc900010476b8 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: 0000000000000000
RDX: 0000000000000012 RSI: ffff888002de0000 RDI: 0000000000000094
RBP: ffff888013c9a000 R08: 0000000000000000 R09: fffffbfff3f9cc6a
R10: ffffc900010476e8 R11: fffffbfff3f9cc69 R12: 0000000000000001
R13: 000000000000000a R14: ffff888013c9af54 R15: ffff888013c9ad08
FS:  00007ffa984ab580(0000) GS:ffff88801fe00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055a6384136c8 CR3: 000000003bbe6003 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 encx24j600_spi_probe drivers/net/ethernet/microchip/encx24j600.c:459
 spi_probe drivers/spi/spi.c:397
 really_probe drivers/base/dd.c:517
 __driver_probe_device drivers/base/dd.c:751
 driver_probe_device drivers/base/dd.c:782
 __device_attach_driver drivers/base/dd.c:899
 bus_for_each_drv drivers/base/bus.c:427
 __device_attach drivers/base/dd.c:971
 bus_probe_device drivers/base/bus.c:487
 device_add drivers/base/core.c:3364
 __spi_add_device drivers/spi/spi.c:599
 spi_add_device drivers/spi/spi.c:641
 spi_new_device drivers/spi/spi.c:717
 new_device_store+0x18c/0x1f1 [spi_stub 4e02719357f1ff33f5a43d00630982840568e85e]
 dev_attr_store drivers/base/core.c:2074
 sysfs_kf_write fs/sysfs/file.c:139
 kernfs_fop_write_iter fs/kernfs/file.c:300
 new_sync_write fs/read_write.c:508 (discriminator 4)
 vfs_write fs/read_write.c:594
 ksys_write fs/read_write.c:648
 do_syscall_64 arch/x86/entry/common.c:50
 entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:113

Add error check in devm_regmap_init_encx24j600 to avoid this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47441</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: thermal: Fix out-of-bounds memory accesses

Currently, mlxsw allows cooling states to be set above the maximum
cooling state supported by the driver:

 # cat /sys/class/thermal/thermal_zone2/cdev0/type
 mlxsw_fan
 # cat /sys/class/thermal/thermal_zone2/cdev0/max_state
 10
 # echo 18 &gt; /sys/class/thermal/thermal_zone2/cdev0/cur_state
 # echo $?
 0

This results in out-of-bounds memory accesses when thermal state
transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the
transition table is accessed with a too large index (state) [1].

According to the thermal maintainer, it is the responsibility of the
driver to reject such operations [2].

Therefore, return an error when the state to be set exceeds the maximum
cooling state supported by the driver.

To avoid dead code, as suggested by the thermal maintainer [3],
partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling
device with cooling levels") that tried to interpret these invalid
cooling states (above the maximum) in a special way. The cooling levels
array is not removed in order to prevent the fans going below 20% PWM,
which would cause them to get stuck at 0% PWM.

[1]
BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290
Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5

CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122
Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016
Workqueue: events_freezable_power_ thermal_zone_device_check
Call Trace:
 dump_stack_lvl+0x8b/0xb3
 print_address_description.constprop.0+0x1f/0x140
 kasan_report.cold+0x7f/0x11b
 thermal_cooling_device_stats_update+0x271/0x290
 __thermal_cdev_update+0x15e/0x4e0
 thermal_cdev_update+0x9f/0xe0
 step_wise_throttle+0x770/0xee0
 thermal_zone_device_update+0x3f6/0xdf0
 process_one_work+0xa42/0x1770
 worker_thread+0x62f/0x13e0
 kthread+0x3ee/0x4e0
 ret_from_fork+0x1f/0x30

Allocated by task 1:
 kasan_save_stack+0x1b/0x40
 __kasan_kmalloc+0x7c/0x90
 thermal_cooling_device_setup_sysfs+0x153/0x2c0
 __thermal_cooling_device_register.part.0+0x25b/0x9c0
 thermal_cooling_device_register+0xb3/0x100
 mlxsw_thermal_init+0x5c5/0x7e0
 __mlxsw_core_bus_device_register+0xcb3/0x19c0
 mlxsw_core_bus_device_register+0x56/0xb0
 mlxsw_pci_probe+0x54f/0x710
 local_pci_probe+0xc6/0x170
 pci_device_probe+0x2b2/0x4d0
 really_probe+0x293/0xd10
 __driver_probe_device+0x2af/0x440
 driver_probe_device+0x51/0x1e0
 __driver_attach+0x21b/0x530
 bus_for_each_dev+0x14c/0x1d0
 bus_add_driver+0x3ac/0x650
 driver_register+0x241/0x3d0
 mlxsw_sp_module_init+0xa2/0x174
 do_one_initcall+0xee/0x5f0
 kernel_init_freeable+0x45a/0x4de
 kernel_init+0x1f/0x210
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff8881052f7800
 which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 1016 bytes inside of
 1024-byte region [ffff8881052f7800, ffff8881052f7c00)
The buggy address belongs to the page:
page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0
head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x200000000010200(slab|head|node=0|zone=2)
raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
 ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                                                ^
 ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc

[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47442</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47442" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: digital: fix possible memory leak in digital_in_send_sdd_req()

'skb' is allocated in digital_in_send_sdd_req(), but not free when
digital_in_send_cmd() failed, which will cause memory leak. Fix it
by freeing 'skb' if digital_in_send_cmd() return failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47443</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47443" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()

'params' is allocated in digital_tg_listen_mdaa(), but not free when
digital_send_cmd() failed, which will cause memory leak. Fix it by
freeing 'params' if digital_send_cmd() return failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47444</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read

In commit e11f5bd8228f ("drm: Add support for DP 1.4 Compliance edid
corruption test") the function connector_bad_edid() started assuming
that the memory for the EDID passed to it was big enough to hold
`edid[0x7e] + 1` blocks of data (1 extra for the base block). It
completely ignored the fact that the function was passed `num_blocks`
which indicated how much memory had been allocated for the EDID.

Let's fix this by adding a bounds check.

This is important for handling the case where there's an error in the
first block of the EDID. In that case we will call
connector_bad_edid() without having re-allocated memory based on
`edid[0x7e]`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47445</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47445" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix null pointer dereference on pointer edp

The initialization of pointer dev dereferences pointer edp before
edp is null checked, so there is a potential null pointer deference
issue. Fix this by only dereferencing edp after edp has been null
checked.

Addresses-Coverity: ("Dereference before null check")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47446</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47446" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a4xx: fix error handling in a4xx_gpu_init()

This code returns 1 on error instead of a negative error.  It leads to
an Oops in the caller.  A second problem is that the check for
"if (ret != -ENODATA)" cannot be true because "ret" is set to 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47447</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47447" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a3xx: fix error handling in a3xx_gpu_init()

These error paths returned 1 on failure, instead of a negative error
code.  This would lead to an Oops in the caller.  A second problem is
that the check for "if (ret != -ENODATA)" did not work because "ret" was
set to 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47448</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47448" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix possible stall on recvmsg()

recvmsg() can enter an infinite loop if the caller provides the
MSG_WAITALL, the data present in the receive queue is not sufficient to
fulfill the request, and no more data is received by the peer.

When the above happens, mptcp_wait_data() will always return with
no wait, as the MPTCP_DATA_READY flag checked by such function is
set and never cleared in such code path.

Leveraging the above syzbot was able to trigger an RCU stall:

rcu: INFO: rcu_preempt self-detected stall on CPU
rcu:    0-...!: (10499 ticks this GP) idle=0af/1/0x4000000000000000 softirq=10678/10678 fqs=1
        (t=10500 jiffies g=13089 q=109)
rcu: rcu_preempt kthread starved for 10497 jiffies! g13089 f0x0 RCU_GP_WAIT_FQS(5) -&gt;state=0x0 -&gt;cpu=1
rcu:    Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:28696 pid:   14 ppid:     2 flags:0x00004000
Call Trace:
 context_switch kernel/sched/core.c:4955 [inline]
 __schedule+0x940/0x26f0 kernel/sched/core.c:6236
 schedule+0xd3/0x270 kernel/sched/core.c:6315
 schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1881
 rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1955
 rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2128
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 8510 Comm: syz-executor827 Not tainted 5.15.0-rc2-next-20210920-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0xc8/0x180 mm/kasan/generic.c:189
Code: 38 00 74 ed 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 7a 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 &lt;48&gt; 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 80 38 00
RSP: 0018:ffffc9000cd676c8 EFLAGS: 00000283
RAX: ffffed100e9a110e RBX: ffffed100e9a110f RCX: ffffffff88ea062a
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888074d08870
RBP: ffffed100e9a110e R08: 0000000000000001 R09: ffff888074d08877
R10: ffffed100e9a110e R11: 0000000000000000 R12: ffff888074d08000
R13: ffff888074d08000 R14: ffff888074d08088 R15: ffff888074d08000
FS:  0000555556d8e300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
S:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000180 CR3: 0000000068909000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
 test_and_clear_bit include/asm-generic/bitops/instrumented-atomic.h:83 [inline]
 mptcp_release_cb+0x14a/0x210 net/mptcp/protocol.c:3016
 release_sock+0xb4/0x1b0 net/core/sock.c:3204
 mptcp_wait_data net/mptcp/protocol.c:1770 [inline]
 mptcp_recvmsg+0xfd1/0x27b0 net/mptcp/protocol.c:2080
 inet6_recvmsg+0x11b/0x5e0 net/ipv6/af_inet6.c:659
 sock_recvmsg_nosec net/socket.c:944 [inline]
 ____sys_recvmsg+0x527/0x600 net/socket.c:2626
 ___sys_recvmsg+0x127/0x200 net/socket.c:2670
 do_recvmmsg+0x24d/0x6d0 net/socket.c:2764
 __sys_recvmmsg net/socket.c:2843 [inline]
 __do_sys_recvmmsg net/socket.c:2866 [inline]
 __se_sys_recvmmsg net/socket.c:2859 [inline]
 __x64_sys_recvmmsg+0x20b/0x260 net/socket.c:2859
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fc200d2
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47449</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47449" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix locking for Tx timestamp tracking flush

Commit 4dd0d5c33c3e ("ice: add lock around Tx timestamp tracker flush")
added a lock around the Tx timestamp tracker flow which is used to
cleanup any left over SKBs and prepare for device removal.

This lock is problematic because it is being held around a call to
ice_clear_phy_tstamp. The clear function takes a mutex to send a PHY
write command to firmware. This could lead to a deadlock if the mutex
actually sleeps, and causes the following warning on a kernel with
preemption debugging enabled:

[  715.419426] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:573
[  715.427900] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3100, name: rmmod
[  715.435652] INFO: lockdep is turned off.
[  715.439591] Preemption disabled at:
[  715.439594] [&lt;0000000000000000&gt;] 0x0
[  715.446678] CPU: 52 PID: 3100 Comm: rmmod Tainted: G        W  OE     5.15.0-rc4+ #42 bdd7ec3018e725f159ca0d372ce8c2c0e784891c
[  715.458058] Hardware name: Intel Corporation S2600STQ/S2600STQ, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  715.468483] Call Trace:
[  715.470940]  dump_stack_lvl+0x6a/0x9a
[  715.474613]  ___might_sleep.cold+0x224/0x26a
[  715.478895]  __mutex_lock+0xb3/0x1440
[  715.482569]  ? stack_depot_save+0x378/0x500
[  715.486763]  ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.494979]  ? kfree+0xc1/0x520
[  715.498128]  ? mutex_lock_io_nested+0x12a0/0x12a0
[  715.502837]  ? kasan_set_free_info+0x20/0x30
[  715.507110]  ? __kasan_slab_free+0x10b/0x140
[  715.511385]  ? slab_free_freelist_hook+0xc7/0x220
[  715.516092]  ? kfree+0xc1/0x520
[  715.519235]  ? ice_deinit_lag+0x16c/0x220 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.527359]  ? ice_remove+0x1cf/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.535133]  ? pci_device_remove+0xab/0x1d0
[  715.539318]  ? __device_release_driver+0x35b/0x690
[  715.544110]  ? driver_detach+0x214/0x2f0
[  715.548035]  ? bus_remove_driver+0x11d/0x2f0
[  715.552309]  ? pci_unregister_driver+0x26/0x250
[  715.556840]  ? ice_module_exit+0xc/0x2f [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.564799]  ? __do_sys_delete_module.constprop.0+0x2d8/0x4e0
[  715.570554]  ? do_syscall_64+0x3b/0x90
[  715.574303]  ? entry_SYSCALL_64_after_hwframe+0x44/0xae
[  715.579529]  ? start_flush_work+0x542/0x8f0
[  715.583719]  ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.591923]  ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.599960]  ? wait_for_completion_io+0x250/0x250
[  715.604662]  ? lock_acquire+0x196/0x200
[  715.608504]  ? do_raw_spin_trylock+0xa5/0x160
[  715.612864]  ice_sbq_rw_reg+0x1e6/0x2f0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.620813]  ? ice_reset+0x130/0x130 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.628497]  ? __debug_check_no_obj_freed+0x1e8/0x3c0
[  715.633550]  ? trace_hardirqs_on+0x1c/0x130
[  715.637748]  ice_write_phy_reg_e810+0x70/0xf0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.646220]  ? do_raw_spin_trylock+0xa5/0x160
[  715.650581]  ? ice_ptp_release+0x910/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.658797]  ? ice_ptp_release+0x255/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.667013]  ice_clear_phy_tstamp+0x2c/0x110 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.675403]  ice_ptp_release+0x408/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.683440]  ice_remove+0x560/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.691037]  ? _raw_spin_unlock_irqrestore+0x46/0x73
[  715.696005]  pci_device_remove+0xab/0x1d0
[  715.700018]  __device_release_driver+0x35b/0x690
[  715.704637]  driver_detach+0x214/0x2f0
[  715.708389]  bus_remove_driver+0x11d/0x2f0
[  715.712489]  pci_unregister_driver+0x26/0x250
[  71
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47450" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix host stage-2 PGD refcount

The KVM page-table library refcounts the pages of concatenated stage-2
PGDs individually. However, when running KVM in protected mode, the
host's stage-2 PGD is currently managed by EL2 as a single high-order
compound page, which can cause the refcount of the tail pages to reach 0
when they shouldn't, hence corrupting the page-table.

Fix this by introducing a new hyp_split_page() helper in the EL2 page
allocator (matching the kernel's split_page() function), and make use of
it from host_s2_zalloc_pages_exact().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47451</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47451" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value

Currently, when the rule related to IDLETIMER is added, idletimer_tg timer
structure is initialized by kmalloc on executing idletimer_tg_create
function. However, in this process timer-&gt;timer_type is not defined to
a specific value. Thus, timer-&gt;timer_type has garbage value and it occurs
kernel panic. So, this commit fixes the panic by initializing
timer-&gt;timer_type using kzalloc instead of kmalloc.

Test commands:
    # iptables -A OUTPUT -j IDLETIMER --timeout 1 --label test
    $ cat /sys/class/xt_idletimer/timers/test
      Killed

Splat looks like:
    BUG: KASAN: user-memory-access in alarm_expires_remaining+0x49/0x70
    Read of size 8 at addr 0000002e8c7bc4c8 by task cat/917
    CPU: 12 PID: 917 Comm: cat Not tainted 5.14.0+ #3 79940a339f71eb14fc81aee1757a20d5bf13eb0e
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014
    Call Trace:
     dump_stack_lvl+0x6e/0x9c
     kasan_report.cold+0x112/0x117
     ? alarm_expires_remaining+0x49/0x70
     __asan_load8+0x86/0xb0
     alarm_expires_remaining+0x49/0x70
     idletimer_tg_show+0xe5/0x19b [xt_IDLETIMER 11219304af9316a21bee5ba9d58f76a6b9bccc6d]
     dev_attr_show+0x3c/0x60
     sysfs_kf_seq_show+0x11d/0x1f0
     ? device_remove_bin_file+0x20/0x20
     kernfs_seq_show+0xa4/0xb0
     seq_read_iter+0x29c/0x750
     kernfs_fop_read_iter+0x25a/0x2c0
     ? __fsnotify_parent+0x3d1/0x570
     ? iov_iter_init+0x70/0x90
     new_sync_read+0x2a7/0x3d0
     ? __x64_sys_llseek+0x230/0x230
     ? rw_verify_area+0x81/0x150
     vfs_read+0x17b/0x240
     ksys_read+0xd9/0x180
     ? vfs_write+0x460/0x460
     ? do_syscall_64+0x16/0xc0
     ? lockdep_hardirqs_on+0x79/0x120
     __x64_sys_read+0x43/0x50
     do_syscall_64+0x3b/0xc0
     entry_SYSCALL_64_after_hwframe+0x44/0xae
    RIP: 0033:0x7f0cdc819142
    Code: c0 e9 c2 fe ff ff 50 48 8d 3d 3a ca 0a 00 e8 f5 19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24
    RSP: 002b:00007fff28eee5b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
    RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f0cdc819142
    RDX: 0000000000020000 RSI: 00007f0cdc032000 RDI: 0000000000000003
    RBP: 00007f0cdc032000 R08: 00007f0cdc031010 R09: 0000000000000000
    R10: 0000000000000022 R11: 0000000000000246 R12: 00005607e9ee31f0
    R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47452</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47452" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: skip netdev events generated on netns removal

syzbot reported following (harmless) WARN:

 WARNING: CPU: 1 PID: 2648 at net/netfilter/core.c:468
  nft_netdev_unregister_hooks net/netfilter/nf_tables_api.c:230 [inline]
  nf_tables_unregister_hook include/net/netfilter/nf_tables.h:1090 [inline]
  __nft_release_basechain+0x138/0x640 net/netfilter/nf_tables_api.c:9524
  nft_netdev_event net/netfilter/nft_chain_filter.c:351 [inline]
  nf_tables_netdev_event+0x521/0x8a0 net/netfilter/nft_chain_filter.c:382

reproducer:
unshare -n bash -c 'ip link add br0 type bridge; nft add table netdev t ; \
 nft add chain netdev t ingress \{ type filter hook ingress device "br0" \
 priority 0\; policy drop\; \}'

Problem is that when netns device exit hooks create the UNREGISTER
event, the .pre_exit hook for nf_tables core has already removed the
base hook.  Notifier attempts to do this again.

The need to do base hook unregister unconditionally was needed in the past,
because notifier was last stage where reg-&gt;dev dereference was safe.

Now that nf_tables does the hook removal in .pre_exit, this isn't
needed anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47453" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Avoid crash from unnecessary IDA free

In the remove path, there is an attempt to free the aux_idx IDA whether
it was allocated or not.  This can potentially cause a crash when
unloading the driver on systems that do not initialize support for RDMA.
But, this free cannot be gated by the status bit for RDMA, since it is
allocated if the driver detects support for RDMA at probe time, but the
driver can enter into a state where RDMA is not supported after the IDA
has been allocated at probe time and this would lead to a memory leak.

Initialize aux_idx to an invalid value and check for a valid value when
unloading to determine if an IDA free is necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47454" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/smp: do not decrement idle task preempt count in CPU offline

With PREEMPT_COUNT=y, when a CPU is offlined and then onlined again, we
get:

BUG: scheduling while atomic: swapper/1/0/0x00000000
no locks held by swapper/1/0.
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.15.0-rc2+ #100
Call Trace:
 dump_stack_lvl+0xac/0x108
 __schedule_bug+0xac/0xe0
 __schedule+0xcf8/0x10d0
 schedule_idle+0x3c/0x70
 do_idle+0x2d8/0x4a0
 cpu_startup_entry+0x38/0x40
 start_secondary+0x2ec/0x3a0
 start_secondary_prolog+0x10/0x14

This is because powerpc's arch_cpu_idle_dead() decrements the idle task's
preempt count, for reasons explained in commit a7c2bb8279d2 ("powerpc:
Re-enable preemption before cpu_die()"), specifically "start_secondary()
expects a preempt_count() of 0."

However, since commit 2c669ef6979c ("powerpc/preempt: Don't touch the idle
task's preempt_count during hotplug") and commit f1a0a376ca0c ("sched/core:
Initialize the idle task with preemption disabled"), that justification no
longer holds.

The idle task isn't supposed to re-enable preemption, so remove the
vestigial preempt_enable() from the CPU offline path.

Tested with pseries and powernv in qemu, and pseries on PowerVM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47455</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: Fix possible memory leak in ptp_clock_register()

I got memory leak as follows when doing fault injection test:

unreferenced object 0xffff88800906c618 (size 8):
  comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s)
  hex dump (first 8 bytes):
    70 74 70 30 00 00 00 00                          ptp0....
  backtrace:
    [&lt;00000000312ed458&gt;] __kmalloc_track_caller+0x19f/0x3a0
    [&lt;0000000079f6e2ff&gt;] kvasprintf+0xb5/0x150
    [&lt;0000000026aae54f&gt;] kvasprintf_const+0x60/0x190
    [&lt;00000000f323a5f7&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;000000004e35abdd&gt;] dev_set_name+0xc0/0x100
    [&lt;00000000f20cfe25&gt;] ptp_clock_register+0x9f4/0xd30 [ptp]
    [&lt;000000008bb9f0de&gt;] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]

When posix_clock_register() returns an error, the name allocated
in dev_set_name() will be leaked, the put_device() should be used
to give up the device reference, then the name will be freed in
kobject_cleanup() and other memory will be freed in ptp_clock_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47456</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: peak_pci: peak_pci_remove(): fix UAF

When remove the module peek_pci, referencing 'chan' again after
releasing 'dev' will cause UAF.

Fix this by releasing 'dev' later.

The following log reveals it:

[   35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537
[   35.965513 ] Call Trace:
[   35.965718 ]  dump_stack_lvl+0xa8/0xd1
[   35.966028 ]  print_address_description+0x87/0x3b0
[   35.966420 ]  kasan_report+0x172/0x1c0
[   35.966725 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.967137 ]  ? trace_irq_enable_rcuidle+0x10/0x170
[   35.967529 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.967945 ]  __asan_report_load8_noabort+0x14/0x20
[   35.968346 ]  peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.968752 ]  pci_device_remove+0xa9/0x250
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47457</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47457" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()

Using wait_event_interruptible() to wait for complete transmission,
but do not check the result of wait_event_interruptible() which can be
interrupted. It will result in TX buffer has multiple accessors and
the later process interferes with the previous process.

Following is one of the problems reported by syzbot.

=============================================================
WARNING: CPU: 0 PID: 0 at net/can/isotp.c:840 isotp_tx_timer_handler+0x2e0/0x4c0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc7+ #68
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014
RIP: 0010:isotp_tx_timer_handler+0x2e0/0x4c0
Call Trace:
 &lt;IRQ&gt;
 ? isotp_setsockopt+0x390/0x390
 __hrtimer_run_queues+0xb8/0x610
 hrtimer_run_softirq+0x91/0xd0
 ? rcu_read_lock_sched_held+0x4d/0x80
 __do_softirq+0xe8/0x553
 irq_exit_rcu+0xf8/0x100
 sysvec_apic_timer_interrupt+0x9e/0xc0
 &lt;/IRQ&gt;
 asm_sysvec_apic_timer_interrupt+0x12/0x20

Add result check for wait_event_interruptible() in isotp_sendmsg()
to avoid multiple accessers for tx buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47458</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47458" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: mount fails with buffer overflow in strlen

Starting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an
ocfs2 filesystem with either o2cb or pcmk cluster stack fails with the
trace below.  Problem seems to be that strings for cluster stack and
cluster name are not guaranteed to be null terminated in the disk
representation, while strlcpy assumes that the source string is always
null terminated.  This causes a read outside of the source string
triggering the buffer overflow detection.

  detected buffer overflow in strlen
  ------------[ cut here ]------------
  kernel BUG at lib/string.c:1149!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1
    Debian 5.14.6-2
  RIP: 0010:fortify_panic+0xf/0x11
  ...
  Call Trace:
   ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]
   ocfs2_fill_super+0x359/0x19b0 [ocfs2]
   mount_bdev+0x185/0x1b0
   legacy_get_tree+0x27/0x40
   vfs_get_tree+0x25/0xb0
   path_mount+0x454/0xa20
   __x64_sys_mount+0x103/0x140
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47459</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47459" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv

It will trigger UAF for rx_kref of j1939_priv as following.

        cpu0                                    cpu1
j1939_sk_bind(socket0, ndev0, ...)
j1939_netdev_start
                                        j1939_sk_bind(socket1, ndev0, ...)
                                        j1939_netdev_start
j1939_priv_set
                                        j1939_priv_get_by_ndev_locked
j1939_jsk_add
.....
j1939_netdev_stop
kref_put_lock(&amp;priv-&gt;rx_kref, ...)
                                        kref_get(&amp;priv-&gt;rx_kref, ...)
                                        REFCOUNT_WARN("addition on 0;...")

====================================================
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0
RIP: 0010:refcount_warn_saturate+0x169/0x1e0
Call Trace:
 j1939_netdev_start+0x68b/0x920
 j1939_sk_bind+0x426/0xeb0
 ? security_socket_bind+0x83/0xb0

The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to
protect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47460</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47460" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix data corruption after conversion from inline format

Commit 6dbf7bb55598 ("fs: Don't invalidate page buffers in
block_write_full_page()") uncovered a latent bug in ocfs2 conversion
from inline inode format to a normal inode format.

The code in ocfs2_convert_inline_data_to_extents() attempts to zero out
the whole cluster allocated for file data by grabbing, zeroing, and
dirtying all pages covering this cluster.  However these pages are
beyond i_size, thus writeback code generally ignores these dirty pages
and no blocks were ever actually zeroed on the disk.

This oversight was fixed by commit 693c241a5f6a ("ocfs2: No need to zero
pages past i_size.") for standard ocfs2 write path, inline conversion
path was apparently forgotten; the commit log also has a reasoning why
the zeroing actually is not needed.

After commit 6dbf7bb55598, things became worse as writeback code stopped
invalidating buffers on pages beyond i_size and thus these pages end up
with clean PageDirty bit but with buffers attached to these pages being
still dirty.  So when a file is converted from inline format, then
writeback triggers, and then the file is grown so that these pages
become valid, the invalid dirtiness state is preserved,
mark_buffer_dirty() does nothing on these pages (buffers are already
dirty) but page is never written back because it is clean.  So data
written to these pages is lost once pages are reclaimed.

Simple reproducer for the problem is:

  xfs_io -f -c "pwrite 0 2000" -c "pwrite 2000 2000" -c "fsync" \
    -c "pwrite 4000 2000" ocfs2_file

After unmounting and mounting the fs again, you can observe that end of
'ocfs2_file' has lost its contents.

Fix the problem by not doing the pointless zeroing during conversion
from inline format similarly as in the standard write path.

[akpm@linux-foundation.org: fix whitespace, per Joseph]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47461</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47461" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix a race between writeprotect and exit_mmap()

A race is possible when a process exits, its VMAs are removed by
exit_mmap() and at the same time userfaultfd_writeprotect() is called.

The race was detected by KASAN on a development kernel, but it appears
to be possible on vanilla kernels as well.

Use mmget_not_zero() to prevent the race as done in other userfaultfd
operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47462" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()

syzbot reported access to unitialized memory in mbind() [1]

Issue came with commit bda420b98505 ("numa balancing: migrate on fault
among multiple bound nodes")

This commit added a new bit in MPOL_MODE_FLAGS, but only checked valid
combination (MPOL_F_NUMA_BALANCING can only be used with MPOL_BIND) in
do_set_mempolicy()

This patch moves the check in sanitize_mpol_flags() so that it is also
used by mbind()

  [1]
  BUG: KMSAN: uninit-value in __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   mpol_equal include/linux/mempolicy.h:105 [inline]
   vma_merge+0x4a1/0x1e60 mm/mmap.c:1190
   mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811
   do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  Uninit was created at:
   slab_alloc_node mm/slub.c:3221 [inline]
   slab_alloc mm/slub.c:3230 [inline]
   kmem_cache_alloc+0x751/0xff0 mm/slub.c:3235
   mpol_new mm/mempolicy.c:293 [inline]
   do_mbind+0x912/0x15f0 mm/mempolicy.c:1289
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  =====================================================
  Kernel panic - not syncing: panic_on_kmsan set ...
  CPU: 0 PID: 15049 Comm: syz-executor.0 Tainted: G    B             5.15.0-rc2-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x1ff/0x28e lib/dump_stack.c:106
   dump_stack+0x25/0x28 lib/dump_stack.c:113
   panic+0x44f/0xdeb kernel/panic.c:232
   kmsan_report+0x2ee/0x300 mm/kmsan/report.c:186
   __msan_warning+0xd7/0x150 mm/kmsan/instrumentation.c:208
   __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   mpol_equal include/linux/mempolicy.h:105 [inline]
   vma_merge+0x4a1/0x1e60 mm/mmap.c:1190
   mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811
   do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47463</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47463" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix NULL page-&gt;mapping dereference in page_is_secretmem()

Check for a NULL page-&gt;mapping before dereferencing the mapping in
page_is_secretmem(), as the page's mapping can be nullified while gup()
is running, e.g.  by reclaim or truncation.

  BUG: kernel NULL pointer dereference, address: 0000000000000068
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G        W
  RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0
  Code: &lt;48&gt; 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be
  RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046
  RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900
  ...
  CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0
  Call Trace:
   get_user_pages_fast_only+0x13/0x20
   hva_to_pfn+0xa9/0x3e0
   try_async_pf+0xa1/0x270
   direct_page_fault+0x113/0xad0
   kvm_mmu_page_fault+0x69/0x680
   vmx_handle_exit+0xe1/0x5d0
   kvm_arch_vcpu_ioctl_run+0xd81/0x1c70
   kvm_vcpu_ioctl+0x267/0x670
   __x64_sys_ioctl+0x83/0xa0
   do_syscall_64+0x56/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47464" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: fix possible null-pointer dereference in audit_filter_rules

Fix  possible null-pointer dereference in audit_filter_rules.

audit_filter_rules() error: we previously assumed 'ctx' could be null
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47465</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47465" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()

In commit 10d91611f426 ("powerpc/64s: Reimplement book3s idle code in
C") kvm_start_guest() became idle_kvm_start_guest(). The old code
allocated a stack frame on the emergency stack, but didn't use the
frame to store anything, and also didn't store anything in its caller's
frame.

idle_kvm_start_guest() on the other hand is written more like a normal C
function, it creates a frame on entry, and also stores CR/LR into its
callers frame (per the ABI). The problem is that there is no caller
frame on the emergency stack.

The emergency stack for a given CPU is allocated with:

  paca_ptrs[i]-&gt;emergency_sp = alloc_stack(limit, i) + THREAD_SIZE;

So emergency_sp actually points to the first address above the emergency
stack allocation for a given CPU, we must not store above it without
first decrementing it to create a frame. This is different to the
regular kernel stack, paca-&gt;kstack, which is initialised to point at an
initial frame that is ready to use.

idle_kvm_start_guest() stores the backchain, CR and LR all of which
write outside the allocation for the emergency stack. It then creates a
stack frame and saves the non-volatile registers. Unfortunately the
frame it creates is not large enough to fit the non-volatiles, and so
the saving of the non-volatile registers also writes outside the
emergency stack allocation.

The end result is that we corrupt whatever is at 0-24 bytes, and 112-248
bytes above the emergency stack allocation.

In practice this has gone unnoticed because the memory immediately above
the emergency stack happens to be used for other stack allocations,
either another CPUs mc_emergency_sp or an IRQ stack. See the order of
calls to irqstack_early_init() and emergency_stack_init().

The low addresses of another stack are the top of that stack, and so are
only used if that stack is under extreme pressue, which essentially
never happens in practice - and if it did there's a high likelyhood we'd
crash due to that stack overflowing.

Still, we shouldn't be corrupting someone else's stack, and it is purely
luck that we aren't corrupting something else.

To fix it we save CR/LR into the caller's frame using the existing r1 on
entry, we then create a SWITCH_FRAME_SIZE frame (which has space for
pt_regs) on the emergency stack with the backchain pointing to the
existing stack, and then finally we switch to the new frame on the
emergency stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227904">SUSE bug 1227904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47466</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47466" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: fix potential memoryleak in kmem_cache_open()

In error path, the random_seq of slub cache might be leaked.  Fix this
by using __kmem_cache_release() to release all the relevant resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47467</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47467" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit: fix reference count leak in kfree_at_end

The reference counting issue happens in the normal path of
kfree_at_end(). When kunit_alloc_and_get_resource() is invoked, the
function forgets to handle the returned resource object, whose refcount
increased inside, causing a refcount leak.

Fix this issue by calling kunit_alloc_resource() instead of
kunit_alloc_and_get_resource().

Fixed the following when applying:
Shuah Khan &lt;skhan@linuxfoundation.org&gt;

CHECK: Alignment should match open parenthesis
+	kunit_alloc_resource(test, NULL, kfree_res_free, GFP_KERNEL,
 				     (void *)to_free);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47468</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isdn: mISDN: Fix sleeping function called from invalid context

The driver can call card-&gt;isac.release() function from an atomic
context.

Fix this by calling this function after releasing the lock.

The following log reveals it:

[   44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018
[   44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe
[   44.169574 ] INFO: lockdep is turned off.
[   44.169899 ] irq event stamp: 0
[   44.170160 ] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.170627 ] hardirqs last disabled at (0): [&lt;ffffffff814209ed&gt;] copy_process+0x132d/0x3e00
[   44.171240 ] softirqs last  enabled at (0): [&lt;ffffffff81420a1a&gt;] copy_process+0x135a/0x3e00
[   44.171852 ] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.172318 ] Preemption disabled at:
[   44.172320 ] [&lt;ffffffffa009b0a9&gt;] nj_release+0x69/0x500 [netjet]
[   44.174441 ] Call Trace:
[   44.174630 ]  dump_stack_lvl+0xa8/0xd1
[   44.174912 ]  dump_stack+0x15/0x17
[   44.175166 ]  ___might_sleep+0x3a2/0x510
[   44.175459 ]  ? nj_release+0x69/0x500 [netjet]
[   44.175791 ]  __might_sleep+0x82/0xe0
[   44.176063 ]  ? start_flush_work+0x20/0x7b0
[   44.176375 ]  start_flush_work+0x33/0x7b0
[   44.176672 ]  ? trace_irq_enable_rcuidle+0x85/0x170
[   44.177034 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177372 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177711 ]  __flush_work+0x11a/0x1a0
[   44.177991 ]  ? flush_work+0x20/0x20
[   44.178257 ]  ? lock_release+0x13c/0x8f0
[   44.178550 ]  ? __kasan_check_write+0x14/0x20
[   44.178872 ]  ? do_raw_spin_lock+0x148/0x360
[   44.179187 ]  ? read_lock_is_recursive+0x20/0x20
[   44.179530 ]  ? __kasan_check_read+0x11/0x20
[   44.179846 ]  ? do_raw_spin_unlock+0x55/0x900
[   44.180168 ]  ? ____kasan_slab_free+0x116/0x140
[   44.180505 ]  ? _raw_spin_unlock_irqrestore+0x41/0x60
[   44.180878 ]  ? skb_queue_purge+0x1a3/0x1c0
[   44.181189 ]  ? kfree+0x13e/0x290
[   44.181438 ]  flush_work+0x17/0x20
[   44.181695 ]  mISDN_freedchannel+0xe8/0x100
[   44.182006 ]  isac_release+0x210/0x260 [mISDNipac]
[   44.182366 ]  nj_release+0xf6/0x500 [netjet]
[   44.182685 ]  nj_remove+0x48/0x70 [netjet]
[   44.182989 ]  pci_device_remove+0xa9/0x250
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47469" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: Fix deadlock when adding SPI controllers on SPI buses

Currently we have a global spi_add_lock which we take when adding new
devices so that we can check that we're not trying to reuse a chip
select that's already controlled.  This means that if the SPI device is
itself a SPI controller and triggers the instantiation of further SPI
devices we trigger a deadlock as we try to register and instantiate
those devices while in the process of doing so for the parent controller
and hence already holding the global spi_add_lock.  Since we only care
about concurrency within a single SPI bus move the lock to be per
controller, avoiding the deadlock.

This can be easily triggered in the case of spi-mux.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47470</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47470" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: fix potential use-after-free in slab_debugfs_fops

When sysfs_slab_add failed, we shouldn't call debugfs_slab_add() for s
because s will be freed soon.  And slab_debugfs_fops will use s later
leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47471</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47471" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: mxsfb: Fix NULL pointer dereference crash on unload

The mxsfb-&gt;crtc.funcs may already be NULL when unloading the driver,
in which case calling mxsfb_irq_disable() via drm_irq_uninstall() from
mxsfb_unload() leads to NULL pointer dereference.

Since all we care about is masking the IRQ and mxsfb-&gt;base is still
valid, just use that to clear and mask the IRQ.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47472</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47472" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47473</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47473" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()

Commit 8c0eb596baa5 ("[SCSI] qla2xxx: Fix a memory leak in an error path of
qla2x00_process_els()"), intended to change:

        bsg_job-&gt;request-&gt;msgcode == FC_BSG_HST_ELS_NOLOGIN


        bsg_job-&gt;request-&gt;msgcode != FC_BSG_RPT_ELS

but changed it to:

        bsg_job-&gt;request-&gt;msgcode == FC_BSG_RPT_ELS

instead.

Change the == to a != to avoid leaking the fcport structure or freeing
unallocated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47474</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47474" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix bulk-buffer overflow

The driver is using endpoint-sized buffers but must not assume that the
tx and rx buffers are of equal size or a malicious device could overflow
the slab-allocated receive buffer when doing bulk transfers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47475</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47475" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix transfer-buffer overflows

The driver uses endpoint-sized USB transfer buffers but up until
recently had no sanity checks on the sizes.

Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize
of usb endpoints found") inadvertently fixed NULL-pointer dereferences
when accessing the transfer buffers in case a malicious device has a
zero wMaxPacketSize.

Make sure to allocate buffers large enough to handle also the other
accesses that are done without a size check (e.g. byte 18 in
vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond
the buffers, for example, when doing descriptor fuzzing.

The original driver was for a low-speed device with 8-byte buffers.
Support was later added for a device that uses bulk transfers and is
presumably a full-speed device with a maximum 64-byte wMaxPacketSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47476</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47476" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: ni_usb6501: fix NULL-deref in command paths

The driver uses endpoint-sized USB transfer buffers but had no sanity
checks on the sizes. This can lead to zero-size-pointer dereferences or
overflowed transfer buffers in ni6501_port_command() and
ni6501_counter_command() if a (malicious) device has smaller max-packet
sizes than expected (or when doing descriptor fuzz testing).

Add the missing sanity checks to probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47477</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: dt9812: fix DMA buffers on stack

USB transfer buffers are typically mapped for DMA and must not be
allocated on the stack or transfers will fail.

Allocate proper transfer buffers in the various command helpers and
return an error on short transfers instead of acting on random stack
data.

Note that this also fixes a stack info leak on systems where DMA is not
used as 32 bytes are always sent to the device regardless of how short
the command is.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47478</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47478" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isofs: Fix out of bound access for corrupted isofs image

When isofs image is suitably corrupted isofs_read_inode() can read data
beyond the end of buffer. Sanity-check the directory entry length before
using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47479</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47479" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8712: fix use-after-free in rtl8712_dl_fw

Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in
race condition between r871xu_dev_remove() -&gt;ndo_open() callback.

It's easy to see from crash log, that driver accesses released firmware
in -&gt;ndo_open() callback. It may happen, since driver was releasing
firmware _before_ unregistering netdev. Fix it by moving
unregister_netdev() before cleaning up resources.

Call Trace:
...
 rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline]
 rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170
 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline]
 rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394
 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380
 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484

Freed by task 1306:
...
 release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053
 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599
 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47480</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47480" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Put LLD module refcnt after SCSI device is released

SCSI host release is triggered when SCSI device is freed. We have to make
sure that the low-level device driver module won't be unloaded before SCSI
host instance is released because shost-&gt;hostt is required in the release
handler.

Make sure to put LLD module refcnt after SCSI device is released.

Fixes a kernel panic of 'BUG: unable to handle page fault for address'
reported by Changhui and Yi.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47481</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47481" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR

Normally the zero fill would hide the missing initialization, but an
errant set to desc_size in reg_create() causes a crash:

  BUG: unable to handle page fault for address: 0000000800000000
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 5 PID: 890 Comm: ib_write_bw Not tainted 5.15.0-rc4+ #47
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:mlx5_ib_dereg_mr+0x14/0x3b0 [mlx5_ib]
  Code: 48 63 cd 4c 89 f7 48 89 0c 24 e8 37 30 03 e1 48 8b 0c 24 eb a0 90 0f 1f 44 00 00 41 56 41 55 41 54 55 53 48 89 fb 48 83 ec 30 &lt;48&gt; 8b 2f 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 8b 87 c8
  RSP: 0018:ffff88811afa3a60 EFLAGS: 00010286
  RAX: 000000000000001c RBX: 0000000800000000 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000800000000
  RBP: 0000000800000000 R08: 0000000000000000 R09: c0000000fffff7ff
  R10: ffff88811afa38f8 R11: ffff88811afa38f0 R12: ffffffffa02c7ac0
  R13: 0000000000000000 R14: ffff88811afa3cd8 R15: ffff88810772fa00
  FS:  00007f47b9080740(0000) GS:ffff88852cd40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000800000000 CR3: 000000010761e003 CR4: 0000000000370ea0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   mlx5_ib_free_odp_mr+0x95/0xc0 [mlx5_ib]
   mlx5_ib_dereg_mr+0x128/0x3b0 [mlx5_ib]
   ib_dereg_mr_user+0x45/0xb0 [ib_core]
   ? xas_load+0x8/0x80
   destroy_hw_idr_uobject+0x1a/0x50 [ib_uverbs]
   uverbs_destroy_uobject+0x2f/0x150 [ib_uverbs]
   uobj_destroy+0x3c/0x70 [ib_uverbs]
   ib_uverbs_cmd_verbs+0x467/0xb00 [ib_uverbs]
   ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]
   ? ttwu_queue_wakelist+0xa9/0xe0
   ? pty_write+0x85/0x90
   ? file_tty_write.isra.33+0x214/0x330
   ? process_echoes+0x60/0x60
   ib_uverbs_ioctl+0xa7/0x110 [ib_uverbs]
   __x64_sys_ioctl+0x10d/0x8e0
   ? vfs_write+0x17f/0x260
   do_syscall_64+0x3c/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Add the missing xarray initialization and remove the desc_size set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47482</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47482" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: batman-adv: fix error handling

Syzbot reported ODEBUG warning in batadv_nc_mesh_free(). The problem was
in wrong error handling in batadv_mesh_init().

Before this patch batadv_mesh_init() was calling batadv_mesh_free() in case
of any batadv_*_init() calls failure. This approach may work well, when
there is some kind of indicator, which can tell which parts of batadv are
initialized; but there isn't any.

All written above lead to cleaning up uninitialized fields. Even if we hide
ODEBUG warning by initializing bat_priv-&gt;nc.work, syzbot was able to hit
GPF in batadv_nc_purge_paths(), because hash pointer in still NULL. [1]

To fix these bugs we can unwind batadv_*_init() calls one by one.
It is good approach for 2 reasons: 1) It fixes bugs on error handling
path 2) It improves the performance, since we won't call unneeded
batadv_*_free() functions.

So, this patch makes all batadv_*_init() clean up all allocated memory
before returning with an error to no call correspoing batadv_*_free()
and open-codes batadv_mesh_free() with proper order to avoid touching
uninitialized fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47483</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47483" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: Fix possible double-free in regcache_rbtree_exit()

In regcache_rbtree_insert_to_block(), when 'present' realloc failed,
the 'blk' which is supposed to assign to 'rbnode-&gt;block' will be freed,
so 'rbnode-&gt;block' points a freed memory, in the error handling path of
regcache_rbtree_init(), 'rbnode-&gt;block' will be freed again in
regcache_rbtree_exit(), KASAN will report double-free as follows:

BUG: KASAN: double-free or invalid-free in kfree+0xce/0x390
Call Trace:
 slab_free_freelist_hook+0x10d/0x240
 kfree+0xce/0x390
 regcache_rbtree_exit+0x15d/0x1a0
 regcache_rbtree_init+0x224/0x2c0
 regcache_init+0x88d/0x1310
 __regmap_init+0x3151/0x4a80
 __devm_regmap_init+0x7d/0x100
 madera_spi_probe+0x10f/0x333 [madera_spi]
 spi_probe+0x183/0x210
 really_probe+0x285/0xc30

To fix this, moving up the assignment of rbnode-&gt;block to immediately after
the reallocation has succeeded so that the data structure stays valid even
if the second reallocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224908">SUSE bug 1224908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47484" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Fix possible null pointer dereference.

This patch fixes possible null pointer dereference in files
"rvu_debugfs.c" and "rvu_nix.c"
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47485</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields

Overflowing either addrlimit or bytes_togo can allow userspace to trigger
a buffer overflow of kernel memory. Check for overflows in all the places
doing math on user controlled buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47486</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47486" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv, bpf: Fix potential NULL dereference

The bpf_jit_binary_free() function requires a non-NULL argument. When
the RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,
jit_data-&gt;header will be NULL, which triggers a NULL
dereference. Avoid this by checking the argument, prior calling the
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47488</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47488" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47489</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47489" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix even more out of bound writes from debugfs

CVE-2021-42327 was fixed by:

commit f23750b5b3d98653b31d4469592935ef6364ad67
Author: Thelford Williams &lt;tdwilliamsiv@gmail.com&gt;
Date:   Wed Oct 13 16:04:13 2021 -0400

    drm/amdgpu: fix out of bounds write

but amdgpu_dm_debugfs.c contains more of the same issue so fix the
remaining ones.

v2:
	* Add missing fix in dp_max_bpc_write (Harry Wentland)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47490</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: fix memleak in ttm_transfered_destroy

We need to cleanup the fences for ghost objects as well.

Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214029
Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214447
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47491</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: khugepaged: skip huge page collapse for special files

The read-only THP for filesystems will collapse THP for files opened
readonly and mapped with VM_EXEC.  The intended usecase is to avoid TLB
misses for large text segments.  But it doesn't restrict the file types
so a THP could be collapsed for a non-regular file, for example, block
device, if it is opened readonly and mapped with EXEC permission.  This
may cause bugs, like [1] and [2].

This is definitely not the intended usecase, so just collapse THP for
regular files in order to close the attack surface.

[shy828301@gmail.com: fix vm_file check [3]]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47492</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, thp: bail out early in collapse_file for writeback page

Currently collapse_file does not explicitly check PG_writeback, instead,
page_has_private and try_to_release_page are used to filter writeback
pages.  This does not work for xfs with blocksize equal to or larger
than pagesize, because in such case xfs has no page-&gt;private.

This makes collapse_file bail out early for writeback page.  Otherwise,
xfs end_page_writeback will panic as follows.

  page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32
  aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:"libtest.so"
  flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)
  raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8
  raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000
  page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u &lt;= 127u))
  page-&gt;mem_cgroup:ffff0000c3e9a000
  ------------[ cut here ]------------
  kernel BUG at include/linux/mm.h:1212!
  Internal error: Oops - BUG: 0 [#1] SMP
  Modules linked in:
  BUG: Bad page state in process khugepaged  pfn:84ef32
   xfs(E)
  page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32
   libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...
  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)
  Call trace:
    end_page_writeback+0x1c0/0x214
    iomap_finish_page_writeback+0x13c/0x204
    iomap_finish_ioend+0xe8/0x19c
    iomap_writepage_end_bio+0x38/0x50
    bio_endio+0x168/0x1ec
    blk_update_request+0x278/0x3f0
    blk_mq_end_request+0x34/0x15c
    virtblk_request_done+0x38/0x74 [virtio_blk]
    blk_done_softirq+0xc4/0x110
    __do_softirq+0x128/0x38c
    __irq_exit_rcu+0x118/0x150
    irq_exit+0x1c/0x30
    __handle_domain_irq+0x8c/0xf0
    gic_handle_irq+0x84/0x108
    el1_irq+0xcc/0x180
    arch_cpu_idle+0x18/0x40
    default_idle_call+0x4c/0x1a0
    cpuidle_idle_call+0x168/0x1e0
    do_idle+0xb4/0x104
    cpu_startup_entry+0x30/0x9c
    secondary_start_kernel+0x104/0x180
  Code: d4210000 b0006161 910c8021 94013f4d (d4210000)
  ---[ end trace 4a88c6a074082f8c ]---
  Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47493</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix race between searching chunks and release journal_head from buffer_head

Encountered a race between ocfs2_test_bg_bit_allocatable() and
jbd2_journal_put_journal_head() resulting in the below vmcore.

  PID: 106879  TASK: ffff880244ba9c00  CPU: 2   COMMAND: "loop3"
  Call trace:
    panic
    oops_end
    no_context
    __bad_area_nosemaphore
    bad_area_nosemaphore
    __do_page_fault
    do_page_fault
    page_fault
      [exception RIP: ocfs2_block_group_find_clear_bits+316]
    ocfs2_block_group_find_clear_bits [ocfs2]
    ocfs2_cluster_group_search [ocfs2]
    ocfs2_search_chain [ocfs2]
    ocfs2_claim_suballoc_bits [ocfs2]
    __ocfs2_claim_clusters [ocfs2]
    ocfs2_claim_clusters [ocfs2]
    ocfs2_local_alloc_slide_window [ocfs2]
    ocfs2_reserve_local_alloc_bits [ocfs2]
    ocfs2_reserve_clusters_with_limit [ocfs2]
    ocfs2_reserve_clusters [ocfs2]
    ocfs2_lock_refcount_allocators [ocfs2]
    ocfs2_make_clusters_writable [ocfs2]
    ocfs2_replace_cow [ocfs2]
    ocfs2_refcount_cow [ocfs2]
    ocfs2_file_write_iter [ocfs2]
    lo_rw_aio
    loop_queue_work
    kthread_worker_fn
    kthread
    ret_from_fork

When ocfs2_test_bg_bit_allocatable() called bh2jh(bg_bh), the
bg_bh-&gt;b_private NULL as jbd2_journal_put_journal_head() raced and
released the jounal head from the buffer head.  Needed to take bit lock
for the bit 'BH_JournalHead' to fix this race.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47494</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47494" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: fix management registrations locking

The management registrations locking was broken, the list was
locked for each wdev, but cfg80211_mgmt_registrations_update()
iterated it without holding all the correct spinlocks, causing
list corruption.

Rather than trying to fix it with fine-grained locking, just
move the lock to the wiphy/rdev (still need the list on each
wdev), we already need to hold the wdev lock to change it, so
there's no contention on the lock in any case. This trivially
fixes the bug since we hold one wdev's lock already, and now
will hold the lock that protects all lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47495</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: sanity check for maxpacket

maxpacket of 0 makes no sense and oopses as we need to divide
by it. Give up.

V2: fixed typo in log and stylistic issues
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47496</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tls: Fix flipped sign in tls_err_abort() calls

sk-&gt;sk_err appears to expect a positive value, a convention that ktls
doesn't always follow and that leads to memory corruption in other code.
For instance,

    [kworker]
    tls_encrypt_done(..., err=&lt;negative error from crypto request&gt;)
      tls_err_abort(.., err)
        sk-&gt;sk_err = err;

    [task]
    splice_from_pipe_feed
      ...
        tls_sw_do_sendpage
          if (sk-&gt;sk_err) {
            ret = -sk-&gt;sk_err;  // ret is positive

    splice_from_pipe_feed (continued)
      ret = actor(...)  // ret is still positive and interpreted as bytes
                        // written, resulting in underflow of buf-&gt;len and
                        // sd-&gt;len, leading to huge buf-&gt;offset and bogus
                        // addresses computed in later calls to actor()

Fix all tls_err_abort() callers to pass a negative error code
consistently and centralize the error-prone sign flip there, throwing in
a warning to catch future misuse and uninlining the function so it
really does only warn once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227656">SUSE bug 1227656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47497</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells

If a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic

 *p &amp;= GENMASK((cell-&gt;nbits%BITS_PER_BYTE) - 1, 0);

will become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we
subtract one from that making a large number that is then shifted more than the
number of bits that fit into an unsigned long.

UBSAN reports this problem:

 UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8
 shift exponent 64 is too large for 64-bit type 'unsigned long'
 CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9
 Hardware name: Google Lazor (rev3+) with KB Backlight (DT)
 Workqueue: events_unbound deferred_probe_work_func
 Call trace:
  dump_backtrace+0x0/0x170
  show_stack+0x24/0x30
  dump_stack_lvl+0x64/0x7c
  dump_stack+0x18/0x38
  ubsan_epilogue+0x10/0x54
  __ubsan_handle_shift_out_of_bounds+0x180/0x194
  __nvmem_cell_read+0x1ec/0x21c
  nvmem_cell_read+0x58/0x94
  nvmem_cell_read_variable_common+0x4c/0xb0
  nvmem_cell_read_variable_le_u32+0x40/0x100
  a6xx_gpu_init+0x170/0x2f4
  adreno_bind+0x174/0x284
  component_bind_all+0xf0/0x264
  msm_drm_bind+0x1d8/0x7a0
  try_to_bring_up_master+0x164/0x1ac
  __component_add+0xbc/0x13c
  component_add+0x20/0x2c
  dp_display_probe+0x340/0x384
  platform_probe+0xc0/0x100
  really_probe+0x110/0x304
  __driver_probe_device+0xb8/0x120
  driver_probe_device+0x4c/0xfc
  __device_attach_driver+0xb0/0x128
  bus_for_each_drv+0x90/0xdc
  __device_attach+0xc8/0x174
  device_initial_probe+0x20/0x2c
  bus_probe_device+0x40/0xa4
  deferred_probe_work_func+0x7c/0xb8
  process_one_work+0x128/0x21c
  process_scheduled_works+0x40/0x54
  worker_thread+0x1ec/0x2a8
  kthread+0x138/0x158
  ret_from_fork+0x10/0x20

Fix it by making sure there are any bits to mask out.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227655">SUSE bug 1227655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47498</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm rq: don't queue request to blk-mq during DM suspend

DM uses blk-mq's quiesce/unquiesce to stop/start device mapper queue.

But blk-mq's unquiesce may come from outside events, such as elevator
switch, updating nr_requests or others, and request may come during
suspend, so simply ask for blk-mq to requeue it.

Fixes one kernel panic issue when running updating nr_requests and
dm-mpath suspend/resume stress test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47499</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47499" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove

When ACPI type is ACPI_SMO8500, the data-&gt;dready_trig will not be set, the
memory allocated by iio_triggered_buffer_setup() will not be freed, and cause
memory leak as follows:

unreferenced object 0xffff888009551400 (size 512):
  comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s)
  hex dump (first 32 bytes):
    02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff  ........ .......
  backtrace:
    [&lt;0000000041ce75ee&gt;] kmem_cache_alloc_trace+0x16d/0x360
    [&lt;000000000aeb17b0&gt;] iio_kfifo_allocate+0x41/0x130 [kfifo_buf]
    [&lt;000000004b40c1f5&gt;] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer]
    [&lt;000000004375b15f&gt;] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013]

Fix it by remove data-&gt;dready_trig condition in probe and remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47500</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: mma8452: Fix trigger reference couting

The mma8452 driver directly assigns a trigger to the struct iio_dev. The
IIO core when done using this trigger will call `iio_trigger_put()` to drop
the reference count by 1.

Without the matching `iio_trigger_get()` in the driver the reference count
can reach 0 too early, the trigger gets freed while still in use and a
use-after-free occurs.

Fix this by getting a reference to the trigger before assigning it to the
IIO device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227698">SUSE bug 1227698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47501</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc

When trying to dump VFs VSI RX/TX descriptors
using debugfs there was a crash
due to NULL pointer dereference in i40e_dbg_dump_desc.
Added a check to i40e_dbg_dump_desc that checks if
VSI type is correct for dumping RX/TX descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47502</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd934x: handle channel mappping list correctly

Currently each channel is added as list to dai channel list, however
there is danger of adding same channel to multiple dai channel list
which endups corrupting the other list where its already added.

This patch ensures that the channel is actually free before adding to
the dai channel list and also ensures that the channel is on the list
before deleting it.

This check was missing previously, and we did not hit this issue as
we were testing very simple usecases with sequence of amixer commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227699">SUSE bug 1227699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47503</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc()

Calling scsi_remove_host() before scsi_add_host() results in a crash:

 BUG: kernel NULL pointer dereference, address: 0000000000000108
 RIP: 0010:device_del+0x63/0x440
 Call Trace:
  device_unregister+0x17/0x60
  scsi_remove_host+0xee/0x2a0
  pm8001_pci_probe+0x6ef/0x1b90 [pm80xx]
  local_pci_probe+0x3f/0x90

We cannot call scsi_remove_host() in pm8001_alloc() because scsi_add_host()
has not been called yet at that point in time.

Function call tree:

  pm8001_pci_probe()
  |
  `- pm8001_pci_alloc()
  |  |
  |  `- pm8001_alloc()
  |     |
  |     `- scsi_remove_host()
  |
  `- scsi_add_host()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47504</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47504" ref_url="https://www.suse.com/security/cve/CVE-2021-47504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: ensure task_work gets run as part of cancelations

If we successfully cancel a work item but that work item needs to be
processed through task_work, then we can be sleeping uninterruptibly
in io_uring_cancel_generic() and never process it. Hence we don't
make forward progress and we end up with an uninterruptible sleep
warning.

While in there, correct a comment that should be IFF, not IIF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47504/">CVE-2021-47504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47504">CVE-2021-47504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225382">SUSE bug 1225382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47505</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aio: fix use-after-free due to missing POLLFREE handling

signalfd_poll() and binder_poll() are special in that they use a
waitqueue whose lifetime is the current task, rather than the struct
file as is normally the case.  This is okay for blocking polls, since a
blocking poll occurs within one task; however, non-blocking polls
require another solution.  This solution is for the queue to be cleared
before it is freed, by sending a POLLFREE notification to all waiters.

Unfortunately, only eventpoll handles POLLFREE.  A second type of
non-blocking poll, aio poll, was added in kernel v4.18, and it doesn't
handle POLLFREE.  This allows a use-after-free to occur if a signalfd or
binder fd is polled with aio poll, and the waitqueue gets freed.

Fix this by making aio poll handle POLLFREE.

A patch by Ramji Jiyani &lt;ramjiyani@google.com&gt;
(https://lore.kernel.org/r/20211027011834.2497484-1-ramjiyani@google.com)
tried to do this by making aio_poll_wake() always complete the request
inline if POLLFREE is seen.  However, that solution had two bugs.
First, it introduced a deadlock, as it unconditionally locked the aio
context while holding the waitqueue lock, which inverts the normal
locking order.  Second, it didn't consider that POLLFREE notifications
are missed while the request has been temporarily de-queued.

The second problem was solved by my previous patch.  This patch then
properly fixes the use-after-free by handling POLLFREE in a
deadlock-free way.  It does this by taking advantage of the fact that
freeing of the waitqueue is RCU-delayed, similar to what eventpoll does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227652">SUSE bug 1227652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47506</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix use-after-free due to delegation race

A delegation break could arrive as soon as we've called vfs_setlease.  A
delegation break runs a callback which immediately (in
nfsd4_cb_recall_prepare) adds the delegation to del_recall_lru.  If we
then exit nfs4_set_delegation without hashing the delegation, it will be
freed as soon as the callback is done with it, without ever being
removed from del_recall_lru.

Symptoms show up later as use-after-free or list corruption warnings,
usually in the laundromat thread.

I suspect aba2072f4523 "nfsd: grant read delegations to clients holding
writes" made this bug easier to hit, but I looked as far back as v3.0
and it looks to me it already had the same problem.  So I'm not sure
where the bug was introduced; it may have been there from the beginning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227497">SUSE bug 1227497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix nsfd startup race (again)

Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first")
has re-opened rpc_pipefs_event() race against nfsd_net_id registration
(register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76
("nfsd: fix nsfd startup race triggering BUG_ON").

Restore the order of register_pernet_subsys() vs register_cld_notifier().
Add WARN_ON() to prevent a future regression.

Crash info:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012
CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1
pc : rpc_pipefs_event+0x54/0x120 [nfsd]
lr : rpc_pipefs_event+0x48/0x120 [nfsd]
Call trace:
 rpc_pipefs_event+0x54/0x120 [nfsd]
 blocking_notifier_call_chain
 rpc_fill_super
 get_tree_keyed
 rpc_fs_get_tree
 vfs_get_tree
 do_mount
 ksys_mount
 __arm64_sys_mount
 el0_svc_handler
 el0_svc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47508</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47508" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47508" ref_url="https://www.suse.com/security/cve/CVE-2021-47508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: free exchange changeset on failures

Fstests runs on my VMs have show several kmemleak reports like the following.

  unreferenced object 0xffff88811ae59080 (size 64):
    comm "xfs_io", pid 12124, jiffies 4294987392 (age 6.368s)
    hex dump (first 32 bytes):
      00 c0 1c 00 00 00 00 00 ff cf 1c 00 00 00 00 00  ................
      90 97 e5 1a 81 88 ff ff 90 97 e5 1a 81 88 ff ff  ................
    backtrace:
      [&lt;00000000ac0176d2&gt;] ulist_add_merge+0x60/0x150 [btrfs]
      [&lt;0000000076e9f312&gt;] set_state_bits+0x86/0xc0 [btrfs]
      [&lt;0000000014fe73d6&gt;] set_extent_bit+0x270/0x690 [btrfs]
      [&lt;000000004f675208&gt;] set_record_extent_bits+0x19/0x20 [btrfs]
      [&lt;00000000b96137b1&gt;] qgroup_reserve_data+0x274/0x310 [btrfs]
      [&lt;0000000057e9dcbb&gt;] btrfs_check_data_free_space+0x5c/0xa0 [btrfs]
      [&lt;0000000019c4511d&gt;] btrfs_delalloc_reserve_space+0x1b/0xa0 [btrfs]
      [&lt;000000006d37e007&gt;] btrfs_dio_iomap_begin+0x415/0x970 [btrfs]
      [&lt;00000000fb8a74b8&gt;] iomap_iter+0x161/0x1e0
      [&lt;0000000071dff6ff&gt;] __iomap_dio_rw+0x1df/0x700
      [&lt;000000002567ba53&gt;] iomap_dio_rw+0x5/0x20
      [&lt;0000000072e555f8&gt;] btrfs_file_write_iter+0x290/0x530 [btrfs]
      [&lt;000000005eb3d845&gt;] new_sync_write+0x106/0x180
      [&lt;000000003fb505bf&gt;] vfs_write+0x24d/0x2f0
      [&lt;000000009bb57d37&gt;] __x64_sys_pwrite64+0x69/0xa0
      [&lt;000000003eba3fdf&gt;] do_syscall_64+0x43/0x90

In case brtfs_qgroup_reserve_data() or btrfs_delalloc_reserve_metadata()
fail the allocated extent_changeset will not be freed.

So in btrfs_check_data_free_space() and btrfs_delalloc_reserve_space()
free the allocated extent_changeset to get rid of the allocated memory.

The issue currently only happens in the direct IO write path, but only
after 65b3c08606e5 ("btrfs: fix ENOSPC failure when attempting direct IO
write into NOCOW range"), and also at defrag_one_locked_target(). Every
other place is always calling extent_changeset_free() even if its call
to btrfs_delalloc_reserve_space() or btrfs_check_data_free_space() has
failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47508/">CVE-2021-47508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47508">CVE-2021-47508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225408">SUSE bug 1225408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47509</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: oss: Limit the period size to 16MB

Set the practical limit to the period size (the fragment shift in OSS)
instead of a full 31bit; a too large value could lead to the exhaust
of memory as we allocate temporary buffers of the period size, too.

As of this patch, we set to 16MB limit, which should cover all use
cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47510</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47510" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix re-dirty process of tree-log nodes

There is a report of a transaction abort of -EAGAIN with the following
script.

  #!/bin/sh

  for d in sda sdb; do
          mkfs.btrfs -d single -m single -f /dev/\${d}
  done

  mount /dev/sda /mnt/test
  mount /dev/sdb /mnt/scratch

  for dir in test scratch; do
          echo 3 &gt;/proc/sys/vm/drop_caches
          fio --directory=/mnt/\${dir} --name=fio.\${dir} --rw=read --size=50G --bs=64m \
                  --numjobs=$(nproc) --time_based --ramp_time=5 --runtime=480 \
                  --group_reporting |&amp; tee /dev/shm/fio.\${dir}
          echo 3 &gt;/proc/sys/vm/drop_caches
  done

  for d in sda sdb; do
          umount /dev/\${d}
  done

The stack trace is shown in below.

  [3310.967991] BTRFS: error (device sda) in btrfs_commit_transaction:2341: errno=-11 unknown (Error while writing out transaction)
  [3310.968060] BTRFS info (device sda): forced readonly
  [3310.968064] BTRFS warning (device sda): Skipping commit of aborted transaction.
  [3310.968065] ------------[ cut here ]------------
  [3310.968066] BTRFS: Transaction aborted (error -11)
  [3310.968074] WARNING: CPU: 14 PID: 1684 at fs/btrfs/transaction.c:1946 btrfs_commit_transaction.cold+0x209/0x2c8
  [3310.968131] CPU: 14 PID: 1684 Comm: fio Not tainted 5.14.10-300.fc35.x86_64 #1
  [3310.968135] Hardware name: DIAWAY Tartu/Tartu, BIOS V2.01.B10 04/08/2021
  [3310.968137] RIP: 0010:btrfs_commit_transaction.cold+0x209/0x2c8
  [3310.968144] RSP: 0018:ffffb284ce393e10 EFLAGS: 00010282
  [3310.968147] RAX: 0000000000000026 RBX: ffff973f147b0f60 RCX: 0000000000000027
  [3310.968149] RDX: ffff974ecf098a08 RSI: 0000000000000001 RDI: ffff974ecf098a00
  [3310.968150] RBP: ffff973f147b0f08 R08: 0000000000000000 R09: ffffb284ce393c48
  [3310.968151] R10: ffffb284ce393c40 R11: ffffffff84f47468 R12: ffff973f101bfc00
  [3310.968153] R13: ffff971f20cf2000 R14: 00000000fffffff5 R15: ffff973f147b0e58
  [3310.968154] FS:  00007efe65468740(0000) GS:ffff974ecf080000(0000) knlGS:0000000000000000
  [3310.968157] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [3310.968158] CR2: 000055691bcbe260 CR3: 000000105cfa4001 CR4: 0000000000770ee0
  [3310.968160] PKRU: 55555554
  [3310.968161] Call Trace:
  [3310.968167]  ? dput+0xd4/0x300
  [3310.968174]  btrfs_sync_file+0x3f1/0x490
  [3310.968180]  __x64_sys_fsync+0x33/0x60
  [3310.968185]  do_syscall_64+0x3b/0x90
  [3310.968190]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [3310.968194] RIP: 0033:0x7efe6557329b
  [3310.968200] RSP: 002b:00007ffe0236ebc0 EFLAGS: 00000293 ORIG_RAX: 000000000000004a
  [3310.968203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe6557329b
  [3310.968204] RDX: 0000000000000000 RSI: 00007efe58d77010 RDI: 0000000000000006
  [3310.968205] RBP: 0000000004000000 R08: 0000000000000000 R09: 00007efe58d77010
  [3310.968207] R10: 0000000016cacc0c R11: 0000000000000293 R12: 00007efe5ce95980
  [3310.968208] R13: 0000000000000000 R14: 00007efe6447c790 R15: 0000000c80000000
  [3310.968212] ---[ end trace 1a346f4d3c0d96ba ]---
  [3310.968214] BTRFS: error (device sda) in cleanup_transaction:1946: errno=-11 unknown

The abort occurs because of a write hole while writing out freeing tree
nodes of a tree-log tree. For zoned btrfs, we re-dirty a freed tree
node to ensure btrfs can write the region and does not leave a hole on
write on a zoned device. The current code fails to re-dirty a node
when the tree-log tree's depth is greater or equal to 2. That leads to
a transaction abort with -EAGAIN.

Fix the issue by properly re-dirtying a node on walking up the tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47511</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: oss: Fix negative period/buffer sizes

The period size calculation in OSS layer may receive a negative value
as an error, but the code there assumes only the positive values and
handle them with size_t.  Due to that, a too big value may be passed
to the lower layers.

This patch changes the code to handle with ssize_t and adds the proper
error checks appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227700">SUSE bug 1227700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47512</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47512" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47512" ref_url="https://www.suse.com/security/cve/CVE-2021-47512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fq_pie: prevent dismantle issue

For some reason, fq_pie_destroy() did not copy
working code from pie_destroy() and other qdiscs,
thus causing elusive bug.

Before calling del_timer_sync(&amp;q-&gt;adapt_timer),
we need to ensure timer will not rearm itself.

rcu: INFO: rcu_preempt self-detected stall on CPU
rcu:    0-....: (4416 ticks this GP) idle=60d/1/0x4000000000000000 softirq=10433/10434 fqs=2579
        (t=10501 jiffies g=13085 q=3989)
NMI backtrace for cpu 0
CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62
 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
 rcu_dump_cpu_stacks+0x25e/0x3f0 kernel/rcu/tree_stall.h:343
 print_cpu_stall kernel/rcu/tree_stall.h:627 [inline]
 check_cpu_stall kernel/rcu/tree_stall.h:711 [inline]
 rcu_pending kernel/rcu/tree.c:3878 [inline]
 rcu_sched_clock_irq.cold+0x9d/0x746 kernel/rcu/tree.c:2597
 update_process_times+0x16d/0x200 kernel/time/timer.c:1785
 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:226
 tick_sched_timer+0x1b0/0x2d0 kernel/time/tick-sched.c:1428
 __run_hrtimer kernel/time/hrtimer.c:1685 [inline]
 __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1103
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:write_comp_data kernel/kcov.c:221 [inline]
RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x1d/0x80 kernel/kcov.c:273
Code: 54 c8 20 48 89 10 c3 66 0f 1f 44 00 00 53 41 89 fb 41 89 f1 bf 03 00 00 00 65 48 8b 0c 25 40 70 02 00 48 89 ce 4c 8b 54 24 08 &lt;e8&gt; 4e f7 ff ff 84 c0 74 51 48 8b 81 88 15 00 00 44 8b 81 84 15 00
RSP: 0018:ffffc90000d27b28 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff888064bf1bf0 RCX: ffff888011928000
RDX: ffff888011928000 RSI: ffff888011928000 RDI: 0000000000000003
RBP: ffff888064bf1c28 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff875d8295 R11: 0000000000000000 R12: 0000000000000000
R13: ffff8880783dd300 R14: 0000000000000000 R15: 0000000000000000
 pie_calculate_probability+0x405/0x7c0 net/sched/sch_pie.c:418
 fq_pie_timer+0x170/0x2a0 net/sched/sch_fq_pie.c:383
 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421
 expire_timers kernel/time/timer.c:1466 [inline]
 __run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734
 __run_timers kernel/time/timer.c:1715 [inline]
 run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747
 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558
 run_ksoftirqd kernel/softirq.c:921 [inline]
 run_ksoftirqd+0x2d/0x60 kernel/softirq.c:913
 smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47512/">CVE-2021-47512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47512">CVE-2021-47512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225424">SUSE bug 1225424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47513" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering

Avoid a memory leak if there is not a CPU port defined.

Addresses-Coverity-ID: 1492897 ("Resource leak")
Addresses-Coverity-ID: 1492899 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47514</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47514" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: fix netns refcount leak in devlink_nl_cmd_reload()

While preparing my patch series adding netns refcount tracking,
I spotted bugs in devlink_nl_cmd_reload()

Some error paths forgot to release a refcount on a netns.

To fix this, we can reduce the scope of get_net()/put_net()
section around the call to devlink_reload().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47515</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

seg6: fix the iif in the IPv6 socket control block

When an IPv4 packet is received, the ip_rcv_core(...) sets the receiving
interface index into the IPv4 socket control block (v5.16-rc4,
net/ipv4/ip_input.c line 510):

    IPCB(skb)-&gt;iif = skb-&gt;skb_iif;

If that IPv4 packet is meant to be encapsulated in an outer IPv6+SRH
header, the seg6_do_srh_encap(...) performs the required encapsulation.
In this case, the seg6_do_srh_encap function clears the IPv6 socket control
block (v5.16-rc4 net/ipv6/seg6_iptunnel.c line 163):

    memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));

The memset(...) was introduced in commit ef489749aae5 ("ipv6: sr: clear
IP6CB(skb) on SRH ip4ip6 encapsulation") a long time ago (2019-01-29).

Since the IPv6 socket control block and the IPv4 socket control block share
the same memory area (skb-&gt;cb), the receiving interface index info is lost
(IP6CB(skb)-&gt;iif is set to zero).

As a side effect, that condition triggers a NULL pointer dereference if
commit 0857d6f8c759 ("ipv6: When forwarding count rx stats on the orig
netdev") is applied.

To fix that issue, we set the IP6CB(skb)-&gt;iif with the index of the
receiving interface once again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225426">SUSE bug 1225426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47516</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: Fix memory leak in nfp_cpp_area_cache_add()

In line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a
CPP area structure. But in line 807 (#2), when the cache is allocated
failed, this CPP area structure is not freed, which will result in
memory leak.

We can fix it by freeing the CPP area when the cache is allocated
failed (#2).

792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)
793 {
794 	struct nfp_cpp_area_cache *cache;
795 	struct nfp_cpp_area *area;

800	area = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),
801 				  0, size);
	// #1: allocates and initializes

802 	if (!area)
803 		return -ENOMEM;

805 	cache = kzalloc(sizeof(*cache), GFP_KERNEL);
806 	if (!cache)
807 		return -ENOMEM; // #2: missing free

817	return 0;
818 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47517</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47517" ref_url="https://www.suse.com/security/cve/CVE-2021-47517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: do not perform operations on net devices being unregistered

There is a short period between a net device starts to be unregistered
and when it is actually gone. In that time frame ethtool operations
could still be performed, which might end up in unwanted or undefined
behaviours[1].

Do not allow ethtool operations after a net device starts its
unregistration. This patch targets the netlink part as the ioctl one
isn't affected: the reference to the net device is taken and the
operation is executed within an rtnl lock section and the net device
won't be found after unregister.

[1] For example adding Tx queues after unregister ends up in NULL
    pointer exceptions and UaFs, such as:

      BUG: KASAN: use-after-free in kobject_get+0x14/0x90
      Read of size 1 at addr ffff88801961248c by task ethtool/755

      CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778
      Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/014
      Call Trace:
       dump_stack_lvl+0x57/0x72
       print_address_description.constprop.0+0x1f/0x140
       kasan_report.cold+0x7f/0x11b
       kobject_get+0x14/0x90
       kobject_add_internal+0x3d1/0x450
       kobject_init_and_add+0xba/0xf0
       netdev_queue_update_kobjects+0xcf/0x200
       netif_set_real_num_tx_queues+0xb4/0x310
       veth_set_channels+0x1c3/0x550
       ethnl_set_channels+0x524/0x610
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47517/">CVE-2021-47517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47517">CVE-2021-47517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225428">SUSE bug 1225428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47518</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done

The done() netlink callback nfc_genl_dump_ses_done() should check if
received argument is non-NULL, because its allocation could fail earlier
in dumpit() (nfc_genl_dump_ses()).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47520" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: pch_can: pch_can_rx_normal: fix use after free

After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).

Reordering the lines solves the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227905">SUSE bug 1227905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47521" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: sja1000: fix use after free in ems_pcmcia_add_card()

If the last channel is not available then "dev" is freed.  Fortunately,
we can just use "pdev-&gt;irq" instead.

Also we should check if at least one channel was set up.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227696">SUSE bug 1227696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47522</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47522" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: bigbenff: prevent null pointer dereference

When emulating the device through uhid, there is a chance we don't have
output reports and so report_field is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47523</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47523" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr

This buffer is currently allocated in hfi1_init():

	if (reinit)
		ret = init_after_reset(dd);
	else
		ret = loadtime_init(dd);
	if (ret)
		goto done;

	/* allocate dummy tail memory for all receive contexts */
	dd-&gt;rcvhdrtail_dummy_kvaddr = dma_alloc_coherent(&amp;dd-&gt;pcidev-&gt;dev,
							 sizeof(u64),
							 &amp;dd-&gt;rcvhdrtail_dummy_dma,
							 GFP_KERNEL);

	if (!dd-&gt;rcvhdrtail_dummy_kvaddr) {
		dd_dev_err(dd, "cannot allocate dummy tail memory\n");
		ret = -ENOMEM;
		goto done;
	}

The reinit triggered path will overwrite the old allocation and leak it.

Fix by moving the allocation to hfi1_alloc_devdata() and the deallocation
to hfi1_free_devdata().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47524</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47524" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: fix minor-number leak on probe errors

Make sure to release the allocated minor number before returning on
probe errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47525</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47525" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: fix use-after-free and memleak on unbind

Deregister the port when unbinding the driver to prevent it from being
used after releasing the driver data and leaking memory allocated by
serial core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227697">SUSE bug 1227697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47526</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47526" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: Fix NULL pointer dereference in -&gt;remove()

drvdata has to be set in _probe() - otherwise platform_get_drvdata()
causes null pointer dereference BUG in _remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47528</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47528" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()

In cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep-&gt;ring
and there is a dereference of it in cdnsp_endpoint_init(), which could
lead to a NULL pointer dereference on failure of cdnsp_ring_alloc().

Fix this bug by adding a check of pep-&gt;ring.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_USB_CDNSP_GADGET=y show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47529</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47529" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: Fix memory leaks in error handling path

Should an error occur (invalid TLV len or memory allocation failure), the
memory already allocated in 'reduce_power_data' should be freed before
returning, otherwise it is leaking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47530</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47530" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47530" ref_url="https://www.suse.com/security/cve/CVE-2021-47530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix wait_fence submitqueue leak

We weren't dropping the submitqueue reference in all paths.  In
particular, when the fence has already been signalled. Split out
a helper to simplify handling this in the various different return
paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47530/">CVE-2021-47530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47530">CVE-2021-47530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225442">SUSE bug 1225442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47531" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47531" ref_url="https://www.suse.com/security/cve/CVE-2021-47531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP

In commit 510410bfc034 ("drm/msm: Implement mmap as GEM object
function") we switched to a new/cleaner method of doing things. That's
good, but we missed a little bit.

Before that commit, we used to _first_ run through the
drm_gem_mmap_obj() case where `obj-&gt;funcs-&gt;mmap()` was NULL. That meant
that we ran:

  vma-&gt;vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
  vma-&gt;vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma-&gt;vm_flags));
  vma-&gt;vm_page_prot = pgprot_decrypted(vma-&gt;vm_page_prot);

...and _then_ we modified those mappings with our own. Now that
`obj-&gt;funcs-&gt;mmap()` is no longer NULL we don't run the default
code. It looks like the fact that the vm_flags got VM_IO / VM_DONTDUMP
was important because we're now getting crashes on Chromebooks that
use ARC++ while logging out. Specifically a crash that looks like this
(this is on a 5.10 kernel w/ relevant backports but also seen on a
5.15 kernel):

  Unable to handle kernel paging request at virtual address ffffffc008000000
  Mem abort info:
    ESR = 0x96000006
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
  Data abort info:
    ISV = 0, ISS = 0x00000006
    CM = 0, WnR = 0
  swapper pgtable: 4k pages, 39-bit VAs, pgdp=000000008293d000
  [ffffffc008000000] pgd=00000001002b3003, p4d=00000001002b3003,
                     pud=00000001002b3003, pmd=0000000000000000
  Internal error: Oops: 96000006 [#1] PREEMPT SMP
  [...]
  CPU: 7 PID: 15734 Comm: crash_dump64 Tainted: G W 5.10.67 #1 [...]
  Hardware name: Qualcomm Technologies, Inc. sc7280 IDP SKU2 platform (DT)
  pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--)
  pc : __arch_copy_to_user+0xc0/0x30c
  lr : copyout+0xac/0x14c
  [...]
  Call trace:
   __arch_copy_to_user+0xc0/0x30c
   copy_page_to_iter+0x1a0/0x294
   process_vm_rw_core+0x240/0x408
   process_vm_rw+0x110/0x16c
   __arm64_sys_process_vm_readv+0x30/0x3c
   el0_svc_common+0xf8/0x250
   do_el0_svc+0x30/0x80
   el0_svc+0x10/0x1c
   el0_sync_handler+0x78/0x108
   el0_sync+0x184/0x1c0
  Code: f8408423 f80008c3 910020c6 36100082 (b8404423)

Let's add the two flags back in.

While we're at it, the fact that we aren't running the default means
that we _don't_ need to clear out VM_PFNMAP, so remove that and save
an instruction.

NOTE: it was confirmed that VM_IO was the important flag to fix the
problem I was seeing, but adding back VM_DONTDUMP seems like a sane
thing to do so I'm doing that too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47531/">CVE-2021-47531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47531">CVE-2021-47531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225443">SUSE bug 1225443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47532</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47532" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47532" ref_url="https://www.suse.com/security/cve/CVE-2021-47532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/devfreq: Fix OPP refcnt leak
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47532/">CVE-2021-47532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47532">CVE-2021-47532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225444">SUSE bug 1225444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47533</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47533" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Clear the HVS FIFO commit pointer once done

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a wait on the previous commit done on a given HVS
FIFO.

However, we never cleared that pointer once done. Since
drm_crtc_commit_put can free the drm_crtc_commit structure directly if
we were the last user, this means that it can lead to a use-after free
if we were to duplicate the state, and that stale pointer would even be
copied to the new state.

Set the pointer to NULL once we're done with the wait so that we don't
carry over a pointer to a free'd structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227498">SUSE bug 1227498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47534</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47534" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Add missing drm_crtc_commit_put

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a global state for the HVS, with each FIFO storing
the current CRTC commit so that we can properly synchronize commits.

However, the refcounting was off and we thus ended up leaking the
drm_crtc_commit structure every commit. Add a drm_crtc_commit_put to
prevent the leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Allocate enough space for GMU registers

In commit 142639a52a01 ("drm/msm/a6xx: fix crashstate capture for
A650") we changed a6xx_get_gmu_registers() to read 3 sets of
registers. Unfortunately, we didn't change the memory allocation for
the array. That leads to a KASAN warning (this was on the chromeos-5.4
kernel, which has the problematic commit backported to it):

  BUG: KASAN: slab-out-of-bounds in _a6xx_get_gmu_registers+0x144/0x430
  Write of size 8 at addr ffffff80c89432b0 by task A618-worker/209
  CPU: 5 PID: 209 Comm: A618-worker Tainted: G        W         5.4.156-lockdep #22
  Hardware name: Google Lazor Limozeen without Touchscreen (rev5 - rev8) (DT)
  Call trace:
   dump_backtrace+0x0/0x248
   show_stack+0x20/0x2c
   dump_stack+0x128/0x1ec
   print_address_description+0x88/0x4a0
   __kasan_report+0xfc/0x120
   kasan_report+0x10/0x18
   __asan_report_store8_noabort+0x1c/0x24
   _a6xx_get_gmu_registers+0x144/0x430
   a6xx_gpu_state_get+0x330/0x25d4
   msm_gpu_crashstate_capture+0xa0/0x84c
   recover_worker+0x328/0x838
   kthread_worker_fn+0x32c/0x574
   kthread+0x2dc/0x39c
   ret_from_fork+0x10/0x18

  Allocated by task 209:
   __kasan_kmalloc+0xfc/0x1c4
   kasan_kmalloc+0xc/0x14
   kmem_cache_alloc_trace+0x1f0/0x2a0
   a6xx_gpu_state_get+0x164/0x25d4
   msm_gpu_crashstate_capture+0xa0/0x84c
   recover_worker+0x328/0x838
   kthread_worker_fn+0x32c/0x574
   kthread+0x2dc/0x39c
   ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47536</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix wrong list_del in smc_lgr_cleanup_early

smc_lgr_cleanup_early() meant to delete the link
group from the link group list, but it deleted
the list head by mistake.

This may cause memory corruption since we didn't
remove the real link group from the list and later
memseted the link group structure.
We got a list corruption panic when testing:

[  231.277259] list_del corruption. prev-&gt;next should be ffff8881398a8000, but was 0000000000000000
[  231.278222] ------------[ cut here ]------------
[  231.278726] kernel BUG at lib/list_debug.c:53!
[  231.279326] invalid opcode: 0000 [#1] SMP NOPTI
[  231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435
[  231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014
[  231.281248] Workqueue: events smc_link_down_work
[  231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90
[  231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c
60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 &lt;0f&gt;
0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc
[  231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292
[  231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000
[  231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040
[  231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001
[  231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001
[  231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003
[  231.288337] FS:  0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
[  231.289160] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0
[  231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  231.291940] Call Trace:
[  231.292211]  smc_lgr_terminate_sched+0x53/0xa0
[  231.292677]  smc_switch_conns+0x75/0x6b0
[  231.293085]  ? update_load_avg+0x1a6/0x590
[  231.293517]  ? ttwu_do_wakeup+0x17/0x150
[  231.293907]  ? update_load_avg+0x1a6/0x590
[  231.294317]  ? newidle_balance+0xca/0x3d0
[  231.294716]  smcr_link_down+0x50/0x1a0
[  231.295090]  ? __wake_up_common_lock+0x77/0x90
[  231.295534]  smc_link_down_work+0x46/0x60
[  231.295933]  process_one_work+0x18b/0x350
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47537</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Fix a memleak bug in rvu_mbox_init()

In rvu_mbox_init(), mbox_regions is not freed or passed out
under the switch-default region, which could lead to a memory leak.

Fix this bug by changing 'return err' to 'goto free_regions'.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_OCTEONTX2_AF=y show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47538</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47538" ref_url="https://www.suse.com/security/cve/CVE-2021-47538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()

Need to call rxrpc_put_local() for peer candidate before kfree() as it
holds a ref to rxrpc_local.

[DH: v2: Changed to abstract the peer freeing code out into a function]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47538/">CVE-2021-47538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47538">CVE-2021-47538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225448">SUSE bug 1225448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47539</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47539" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47539" ref_url="https://www.suse.com/security/cve/CVE-2021-47539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()

Need to call rxrpc_put_peer() for bundle candidate before kfree() as it
holds a ref to rxrpc_peer.

[DH: v2: Changed to abstract out the bundle freeing code into a function]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47539/">CVE-2021-47539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47539">CVE-2021-47539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225452">SUSE bug 1225452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47540</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47540" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode

Fix the following NULL pointer dereference in mt7915_get_phy_mode
routine adding an ibss interface to the mt7915 driver.

[  101.137097] wlan0: Trigger new scan to find an IBSS to join
[  102.827039] wlan0: Creating new IBSS network, BSSID 26:a4:50:1a:6e:69
[  103.064756] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  103.073670] Mem abort info:
[  103.076520]   ESR = 0x96000005
[  103.079614]   EC = 0x25: DABT (current EL), IL = 32 bits
[  103.084934]   SET = 0, FnV = 0
[  103.088042]   EA = 0, S1PTW = 0
[  103.091215] Data abort info:
[  103.094104]   ISV = 0, ISS = 0x00000005
[  103.098041]   CM = 0, WnR = 0
[  103.101044] user pgtable: 4k pages, 39-bit VAs, pgdp=00000000460b1000
[  103.107565] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[  103.116590] Internal error: Oops: 96000005 [#1] SMP
[  103.189066] CPU: 1 PID: 333 Comm: kworker/u4:3 Not tainted 5.10.75 #0
[  103.195498] Hardware name: MediaTek MT7622 RFB1 board (DT)
[  103.201124] Workqueue: phy0 ieee80211_iface_work [mac80211]
[  103.206695] pstate: 20000005 (nzCv daif -PAN -UAO -TCO BTYPE=--)
[  103.212705] pc : mt7915_get_phy_mode+0x68/0x120 [mt7915e]
[  103.218103] lr : mt7915_mcu_add_bss_info+0x11c/0x760 [mt7915e]
[  103.223927] sp : ffffffc011cdb9e0
[  103.227235] x29: ffffffc011cdb9e0 x28: ffffff8006563098
[  103.232545] x27: ffffff8005f4da22 x26: ffffff800685ac40
[  103.237855] x25: 0000000000000001 x24: 000000000000011f
[  103.243165] x23: ffffff8005f4e260 x22: ffffff8006567918
[  103.248475] x21: ffffff8005f4df80 x20: ffffff800685ac58
[  103.253785] x19: ffffff8006744400 x18: 0000000000000000
[  103.259094] x17: 0000000000000000 x16: 0000000000000001
[  103.264403] x15: 000899c3a2d9d2e4 x14: 000899bdc3c3a1c8
[  103.269713] x13: 0000000000000000 x12: 0000000000000000
[  103.275024] x11: ffffffc010e30c20 x10: 0000000000000000
[  103.280333] x9 : 0000000000000050 x8 : ffffff8006567d88
[  103.285642] x7 : ffffff8006563b5c x6 : ffffff8006563b44
[  103.290952] x5 : 0000000000000002 x4 : 0000000000000001
[  103.296262] x3 : 0000000000000001 x2 : 0000000000000001
[  103.301572] x1 : 0000000000000000 x0 : 0000000000000011
[  103.306882] Call trace:
[  103.309328]  mt7915_get_phy_mode+0x68/0x120 [mt7915e]
[  103.314378]  mt7915_bss_info_changed+0x198/0x200 [mt7915e]
[  103.319941]  ieee80211_bss_info_change_notify+0x128/0x290 [mac80211]
[  103.326360]  __ieee80211_sta_join_ibss+0x308/0x6c4 [mac80211]
[  103.332171]  ieee80211_sta_create_ibss+0x8c/0x10c [mac80211]
[  103.337895]  ieee80211_ibss_work+0x3dc/0x614 [mac80211]
[  103.343185]  ieee80211_iface_work+0x388/0x3f0 [mac80211]
[  103.348495]  process_one_work+0x288/0x690
[  103.352499]  worker_thread+0x70/0x464
[  103.356157]  kthread+0x144/0x150
[  103.359380]  ret_from_fork+0x10/0x18
[  103.362952] Code: 394008c3 52800220 394000e4 7100007f (39400023)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47541</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()

In mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and
tmp-&gt;tx_cq will be freed on the error path of mlx4_en_copy_priv().
After that mlx4_en_alloc_resources() is called and there is a dereference
of &amp;tmp-&gt;tx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to
a use after free problem on failure of mlx4_en_copy_priv().

Fix this bug by adding a check of mlx4_en_copy_priv()

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_MLX4_EN=m show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225454">SUSE bug 1225454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47542</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()

In qlcnic_83xx_add_rings(), the indirect function of
ahw-&gt;hw_ops-&gt;alloc_mbx_args will be called to allocate memory for
cmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),
which could lead to a NULL pointer dereference on failure of the
indirect function like qlcnic_83xx_alloc_mbx_args().

Fix this bug by adding a check of alloc_mbx_args(), this patch
imitates the logic of mbx_cmd()'s failure handling.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_QLCNIC=m show no new warnings, and our
static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47544</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47544" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix page frag corruption on page fault

Steffen reported a TCP stream corruption for HTTP requests
served by the apache web-server using a cifs mount-point
and memory mapping the relevant file.

The root cause is quite similar to the one addressed by
commit 20eb4f29b602 ("net: fix sk_page_frag() recursion from
memory reclaim"). Here the nested access to the task page frag
is caused by a page fault on the (mmapped) user-space memory
buffer coming from the cifs file.

The page fault handler performs an smb transaction on a different
socket, inside the same process context. Since sk-&gt;sk_allaction
for such socket does not prevent the usage for the task_frag,
the nested allocation modify "under the hood" the page frag
in use by the outer sendmsg call, corrupting the stream.

The overall relevant stack trace looks like the following:

httpd 78268 [001] 3461630.850950:      probe:tcp_sendmsg_locked:
        ffffffff91461d91 tcp_sendmsg_locked+0x1
        ffffffff91462b57 tcp_sendmsg+0x27
        ffffffff9139814e sock_sendmsg+0x3e
        ffffffffc06dfe1d smb_send_kvec+0x28
        [...]
        ffffffffc06cfaf8 cifs_readpages+0x213
        ffffffff90e83c4b read_pages+0x6b
        ffffffff90e83f31 __do_page_cache_readahead+0x1c1
        ffffffff90e79e98 filemap_fault+0x788
        ffffffff90eb0458 __do_fault+0x38
        ffffffff90eb5280 do_fault+0x1a0
        ffffffff90eb7c84 __handle_mm_fault+0x4d4
        ffffffff90eb8093 handle_mm_fault+0xc3
        ffffffff90c74f6d __do_page_fault+0x1ed
        ffffffff90c75277 do_page_fault+0x37
        ffffffff9160111e page_fault+0x1e
        ffffffff9109e7b5 copyin+0x25
        ffffffff9109eb40 _copy_from_iter_full+0xe0
        ffffffff91462370 tcp_sendmsg_locked+0x5e0
        ffffffff91462370 tcp_sendmsg_locked+0x5e0
        ffffffff91462b57 tcp_sendmsg+0x27
        ffffffff9139815c sock_sendmsg+0x4c
        ffffffff913981f7 sock_write_iter+0x97
        ffffffff90f2cc56 do_iter_readv_writev+0x156
        ffffffff90f2dff0 do_iter_write+0x80
        ffffffff90f2e1c3 vfs_writev+0xa3
        ffffffff90f2e27c do_writev+0x5c
        ffffffff90c042bb do_syscall_64+0x5b
        ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65

The cifs filesystem rightfully sets sk_allocations to GFP_NOFS,
we can avoid the nesting using the sk page frag for allocation
lacking the __GFP_FS flag. Do not define an additional mm-helper
for that, as this is strictly tied to the sk page frag usage.

v1 -&gt; v2:
 - use a stricted sk_page_frag() check instead of reordering the
   code (Eric)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix memory leak in fib6_rule_suppress

The kernel leaks memory when a `fib` rule is present in IPv6 nftables
firewall rules and a suppress_prefix rule is present in the IPv6 routing
rules (used by certain tools such as wg-quick). In such scenarios, every
incoming packet will leak an allocation in `ip6_dst_cache` slab cache.

After some hours of `bpftrace`-ing and source code reading, I tracked
down the issue to ca7a03c41753 ("ipv6: do not free rt if
FIB_LOOKUP_NOREF is set on suppress rule").

The problem with that change is that the generic `args-&gt;flags` always have
`FIB_LOOKUP_NOREF` set[1][2] but the IPv6-specific flag
`RT6_LOOKUP_F_DST_NOREF` might not be, leading to `fib6_rule_suppress` not
decreasing the refcount when needed.

How to reproduce:
 - Add the following nftables rule to a prerouting chain:
     meta nfproto ipv6 fib saddr . mark . iif oif missing drop
   This can be done with:
     sudo nft create table inet test
     sudo nft create chain inet test test_chain '{ type filter hook prerouting priority filter + 10; policy accept; }'
     sudo nft add rule inet test test_chain meta nfproto ipv6 fib saddr . mark . iif oif missing drop
 - Run:
     sudo ip -6 rule add table main suppress_prefixlength 0
 - Watch `sudo slabtop -o | grep ip6_dst_cache` to see memory usage increase
   with every incoming ipv6 packet.

This patch exposes the protocol-specific flags to the protocol
specific `suppress` function, and check the protocol-specific `flags`
argument for RT6_LOOKUP_F_DST_NOREF instead of the generic
FIB_LOOKUP_NOREF when decreasing the refcount, like this.

[1]: https://github.com/torvalds/linux/blob/ca7a03c4175366a92cee0ccc4fec0038c3266e26/net/ipv6/fib6_rules.c#L71
[2]: https://github.com/torvalds/linux/blob/ca7a03c4175366a92cee0ccc4fec0038c3266e26/net/ipv6/fib6_rules.c#L99
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225504">SUSE bug 1225504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47547</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47547" ref_url="https://www.suse.com/security/cve/CVE-2021-47547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy[8]' may be out of bound

In line 5001, if all id in the array 'lp-&gt;phy[8]' is not 0, when the
'for' end, the 'k' is 8.

At this time, the array 'lp-&gt;phy[8]' may be out of bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47547/">CVE-2021-47547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47547">CVE-2021-47547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225505">SUSE bug 1225505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47548</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47548" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()

The if statement:
  if (port &gt;= DSAF_GE_NUM)
        return;

limits the value of port less than DSAF_GE_NUM (i.e., 8).
However, if the value of port is 6 or 7, an array overflow could occur:
  port_rst_off = dsaf_dev-&gt;mac_cb[port]-&gt;port_rst_off;

because the length of dsaf_dev-&gt;mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).

To fix this possible array overflow, we first check port and if it is
greater than or equal to DSAF_MAX_PORT_NUM, the function returns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225506">SUSE bug 1225506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47549</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47549" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl

When the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux,
a bug is reported:
 ==================================================================
 BUG: Unable to handle kernel data access on read at 0x80000800805b502c
 Oops: Kernel access of bad area, sig: 11 [#1]
 NIP [c0000000000388a4] .ioread32+0x4/0x20
 LR [80000000000c6034] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl]
 Call Trace:
  .free_irq+0x1c/0x4e0 (unreliable)
  .ata_host_stop+0x74/0xd0 [libata]
  .release_nodes+0x330/0x3f0
  .device_release_driver_internal+0x178/0x2c0
  .driver_detach+0x64/0xd0
  .bus_remove_driver+0x70/0xf0
  .driver_unregister+0x38/0x80
  .platform_driver_unregister+0x14/0x30
  .fsl_sata_driver_exit+0x18/0xa20 [sata_fsl]
  .__se_sys_delete_module+0x1ec/0x2d0
  .system_call_exception+0xfc/0x1f0
  system_call_common+0xf8/0x200
 ==================================================================

The triggering of the BUG is shown in the following stack:

driver_detach
  device_release_driver_internal
    __device_release_driver
      drv-&gt;remove(dev) --&gt; platform_drv_remove/platform_remove
        drv-&gt;remove(dev) --&gt; sata_fsl_remove
          iounmap(host_priv-&gt;hcr_base);			&lt;---- unmap
          kfree(host_priv);                             &lt;---- free
      devres_release_all
        release_nodes
          dr-&gt;node.release(dev, dr-&gt;data) --&gt; ata_host_stop
            ap-&gt;ops-&gt;port_stop(ap) --&gt; sata_fsl_port_stop
                ioread32(hcr_base + HCONTROL)           &lt;---- UAF
            host-&gt;ops-&gt;host_stop(host)

The iounmap(host_priv-&gt;hcr_base) and kfree(host_priv) functions should
not be executed in drv-&gt;remove. These functions should be executed in
host_stop after port_stop. Therefore, we move these functions to the
new function sata_fsl_host_stop and bind the new function to host_stop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227654">SUSE bug 1227654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47550</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: fix potential memleak

In function amdgpu_get_xgmi_hive, when kobject_init_and_add failed
There is a potential memleak if not call kobject_put.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47551</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47551" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again

In SRIOV configuration, the reset may failed to bring asic back to normal but stop cpsch
already been called, the start_cpsch will not be called since there is no resume in this
case.  When reset been triggered again, driver should avoid to do uninitialization again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47552</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47552" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47552" ref_url="https://www.suse.com/security/cve/CVE-2021-47552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()

For avoiding to slow down queue destroy, we don't call
blk_mq_quiesce_queue() in blk_cleanup_queue(), instead of delaying to
cancel dispatch work in blk_release_queue().

However, this way has caused kernel oops[1], reported by Changhui. The log
shows that scsi_device can be freed before running blk_release_queue(),
which is expected too since scsi_device is released after the scsi disk
is closed and the scsi_device is removed.

Fixes the issue by canceling blk-mq dispatch work in both blk_cleanup_queue()
and disk_release():

1) when disk_release() is run, the disk has been closed, and any sync
dispatch activities have been done, so canceling dispatch work is enough to
quiesce filesystem I/O dispatch activity.

2) in blk_cleanup_queue(), we only focus on passthrough request, and
passthrough request is always explicitly allocated &amp; freed by
its caller, so once queue is frozen, all sync dispatch activity
for passthrough request has been done, then it is enough to just cancel
dispatch work for avoiding any dispatch activity.

[1] kernel panic log
[12622.769416] BUG: kernel NULL pointer dereference, address: 0000000000000300
[12622.777186] #PF: supervisor read access in kernel mode
[12622.782918] #PF: error_code(0x0000) - not-present page
[12622.788649] PGD 0 P4D 0
[12622.791474] Oops: 0000 [#1] PREEMPT SMP PTI
[12622.796138] CPU: 10 PID: 744 Comm: kworker/10:1H Kdump: loaded Not tainted 5.15.0+ #1
[12622.804877] Hardware name: Dell Inc. PowerEdge R730/0H21J3, BIOS 1.5.4 10/002/2015
[12622.813321] Workqueue: kblockd blk_mq_run_work_fn
[12622.818572] RIP: 0010:sbitmap_get+0x75/0x190
[12622.823336] Code: 85 80 00 00 00 41 8b 57 08 85 d2 0f 84 b1 00 00 00 45 31 e4 48 63 cd 48 8d 1c 49 48 c1 e3 06 49 03 5f 10 4c 8d 6b 40 83 f0 01 &lt;48&gt; 8b 33 44 89 f2 4c 89 ef 0f b6 c8 e8 fa f3 ff ff 83 f8 ff 75 58
[12622.844290] RSP: 0018:ffffb00a446dbd40 EFLAGS: 00010202
[12622.850120] RAX: 0000000000000001 RBX: 0000000000000300 RCX: 0000000000000004
[12622.858082] RDX: 0000000000000006 RSI: 0000000000000082 RDI: ffffa0b7a2dfe030
[12622.866042] RBP: 0000000000000004 R08: 0000000000000001 R09: ffffa0b742721334
[12622.874003] R10: 0000000000000008 R11: 0000000000000008 R12: 0000000000000000
[12622.881964] R13: 0000000000000340 R14: 0000000000000000 R15: ffffa0b7a2dfe030
[12622.889926] FS:  0000000000000000(0000) GS:ffffa0baafb40000(0000) knlGS:0000000000000000
[12622.898956] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[12622.905367] CR2: 0000000000000300 CR3: 0000000641210001 CR4: 00000000001706e0
[12622.913328] Call Trace:
[12622.916055]  &lt;TASK&gt;
[12622.918394]  scsi_mq_get_budget+0x1a/0x110
[12622.922969]  __blk_mq_do_dispatch_sched+0x1d4/0x320
[12622.928404]  ? pick_next_task_fair+0x39/0x390
[12622.933268]  __blk_mq_sched_dispatch_requests+0xf4/0x140
[12622.939194]  blk_mq_sched_dispatch_requests+0x30/0x60
[12622.944829]  __blk_mq_run_hw_queue+0x30/0xa0
[12622.949593]  process_one_work+0x1e8/0x3c0
[12622.954059]  worker_thread+0x50/0x3b0
[12622.958144]  ? rescuer_thread+0x370/0x370
[12622.962616]  kthread+0x158/0x180
[12622.966218]  ? set_kthread_struct+0x40/0x40
[12622.970884]  ret_from_fork+0x22/0x30
[12622.974875]  &lt;/TASK&gt;
[12622.977309] Modules linked in: scsi_debug rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs sunrpc dm_multipath intel_rapl_msr intel_rapl_common dell_wmi_descriptor sb_edac rfkill video x86_pkg_temp_thermal intel_powerclamp dcdbas coretemp kvm_intel kvm mgag200 irqbypass i2c_algo_bit rapl drm_kms_helper ipmi_ssif intel_cstate intel_uncore syscopyarea sysfillrect sysimgblt fb_sys_fops pcspkr cec mei_me lpc_ich mei ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter drm fuse xfs libcrc32c sr_mod cdrom sd_mod t10_pi sg ixgbe ahci libahci crct10dif_pclmul crc32_pclmul crc32c_intel libata megaraid_sas ghash_clmulni_intel tg3 wdat_w
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47552/">CVE-2021-47552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47552">CVE-2021-47552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225513">SUSE bug 1225513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47553</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47553" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/scs: Reset task stack state in bringup_cpu()

To hot unplug a CPU, the idle task on that CPU calls a few layers of C
code before finally leaving the kernel. When KASAN is in use, poisoned
shadow is left around for each of the active stack frames, and when
shadow call stacks are in use. When shadow call stacks (SCS) are in use
the task's saved SCS SP is left pointing at an arbitrary point within
the task's shadow call stack.

When a CPU is offlined than onlined back into the kernel, this stale
state can adversely affect execution. Stale KASAN shadow can alias new
stackframes and result in bogus KASAN warnings. A stale SCS SP is
effectively a memory leak, and prevents a portion of the shadow call
stack being used. Across a number of hotplug cycles the idle task's
entire shadow call stack can become unusable.

We previously fixed the KASAN issue in commit:

  e1b77c92981a5222 ("sched/kasan: remove stale KASAN poison after hotplug")

... by removing any stale KASAN stack poison immediately prior to
onlining a CPU.

Subsequently in commit:

  f1a0a376ca0c4ef1 ("sched/core: Initialize the idle task with preemption disabled")

... the refactoring left the KASAN and SCS cleanup in one-time idle
thread initialization code rather than something invoked prior to each
CPU being onlined, breaking both as above.

We fixed SCS (but not KASAN) in commit:

  63acd42c0d4942f7 ("sched/scs: Reset the shadow stack when idle_task_exit")

... but as this runs in the context of the idle task being offlined it's
potentially fragile.

To fix these consistently and more robustly, reset the SCS SP and KASAN
shadow of a CPU's idle task immediately before we online that CPU in
bringup_cpu(). This ensures the idle task always has a consistent state
when it is running, and removes the need to so so when exiting an idle
task.

Whenever any thread is created, dup_task_struct() will give the task a
stack which is free of KASAN shadow, and initialize the task's SCS SP,
so there's no need to specially initialize either for idle thread within
init_idle(), as this was only necessary to handle hotplug cycles.

I've tested this on arm64 with:

* gcc 11.1.0, defconfig +KASAN_INLINE, KASAN_STACK
* clang 12.0.0, defconfig +KASAN_INLINE, KASAN_STACK, SHADOW_CALL_STACK

... offlining and onlining CPUS with:

| while true; do
|   for C in /sys/devices/system/cpu/cpu*/online; do
|     echo 0 &gt; $C;
|     echo 1 &gt; $C;
|   done
| done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227558">SUSE bug 1227558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47554</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47554" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim: avoid putting an uninitialized iova_domain

The system will crash if we put an uninitialized iova_domain, this
could happen when an error occurs before initializing the iova_domain
in vdpasim_create().

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
RIP: 0010:__cpuhp_state_remove_instance+0x96/0x1c0
...
Call Trace:
 &lt;TASK&gt;
 put_iova_domain+0x29/0x220
 vdpasim_free+0xd1/0x120 [vdpa_sim]
 vdpa_release_dev+0x21/0x40 [vdpa]
 device_release+0x33/0x90
 kobject_release+0x63/0x160
 vdpasim_create+0x127/0x2a0 [vdpa_sim]
 vdpasim_net_dev_add+0x7d/0xfe [vdpa_sim_net]
 vdpa_nl_cmd_dev_add_set_doit+0xe1/0x1a0 [vdpa]
 genl_family_rcv_msg_doit+0x112/0x140
 genl_rcv_msg+0xdf/0x1d0
 ...

So we must make sure the iova_domain is already initialized before
put it.

In addition, we may get the following warning in this case:
WARNING: ... drivers/iommu/iova.c:344 iova_cache_put+0x58/0x70

So we must make sure the iova_cache_put() is invoked only if the
iova_cache_get() is already invoked. Let's fix it together.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47555</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix underflow for the real_dev refcnt

Inject error before dev_hold(real_dev) in register_vlan_dev(),
and execute the following testcase:

ip link add dev dummy1 type dummy
ip link add name dummy1.100 link dummy1 type vlan id 100
ip link del dev dummy1

When the dummy netdevice is removed, we will get a WARNING as following:

=======================================================================
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 2 PID: 0 at lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0

and an endless loop of:

=======================================================================
unregister_netdevice: waiting for dummy1 to become free. Usage count = -1073741824

That is because dev_put(real_dev) in vlan_dev_free() be called without
dev_hold(real_dev) in register_vlan_dev(). It makes the refcnt of real_dev
underflow.

Move the dev_hold(real_dev) to vlan_dev_init() which is the call-back of
ndo_init(). That makes dev_hold() and dev_put() for vlan's real_dev
symmetrical.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47556</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()

ethtool_set_coalesce() now uses both the .get_coalesce() and
.set_coalesce() callbacks. But the check for their availability is
buggy, so changing the coalesce settings on a device where the driver
provides only _one_ of the callbacks results in a NULL pointer
dereference instead of an -EOPNOTSUPP.

Fix the condition so that the availability of both callbacks is
ensured. This also matches the netlink code.

Note that reproducing this requires some effort - it only affects the
legacy ioctl path, and needs a specific combination of driver options:
- have .get_coalesce() and .coalesce_supported but no
 .set_coalesce(), or
- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn't
  cause the crash as it first attempts to call ethtool_get_coalesce()
  and bails out on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47557</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47557" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_ets: don't peek at classes beyond 'nbands'

when the number of DRR classes decreases, the round-robin active list can
contain elements that have already been freed in ets_qdisc_change(). As a
consequence, it's possible to see a NULL dereference crash, caused by the
attempt to call cl-&gt;qdisc-&gt;ops-&gt;peek(cl-&gt;qdisc) when cl-&gt;qdisc is NULL:

 BUG: kernel NULL pointer dereference, address: 0000000000000018
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 1 PID: 910 Comm: mausezahn Not tainted 5.16.0-rc1+ #475
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 RIP: 0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets]
 Code: c5 01 41 39 ad e4 02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00 00 00 49 8b ad c0 02 00 00 48 8b 7d 10 &lt;48&gt; 8b 47 18 48 8b 40 38 0f ae e8 ff d0 48 89 c3 48 85 c0 0f 84 9d
 RSP: 0000:ffffbb36c0b5fdd8 EFLAGS: 00010287
 RAX: ffff956678efed30 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI: 0000000000000000
 RBP: ffff956678efed30 R08: e2f3207fe360129c R09: 0000000000000000
 R10: 0000000000000001 R11: 0000000000000001 R12: ffff956678efeac0
 R13: ffff956678efe800 R14: ffff956611545000 R15: ffff95667ac8f100
 FS:  00007f2aa9120740(0000) GS:ffff95667b800000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000018 CR3: 000000011070c000 CR4: 0000000000350ee0
 Call Trace:
  &lt;TASK&gt;
  qdisc_peek_dequeued+0x29/0x70 [sch_ets]
  tbf_dequeue+0x22/0x260 [sch_tbf]
  __qdisc_run+0x7f/0x630
  net_tx_action+0x290/0x4c0
  __do_softirq+0xee/0x4f8
  irq_exit_rcu+0xf4/0x130
  sysvec_apic_timer_interrupt+0x52/0xc0
  asm_sysvec_apic_timer_interrupt+0x12/0x20
 RIP: 0033:0x7f2aa7fc9ad4
 Code: b9 ff ff 48 8b 54 24 18 48 83 c4 08 48 89 ee 48 89 df 5b 5d e9 ed fc ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa &lt;53&gt; 48 83 ec 10 48 8b 05 10 64 33 00 48 8b 00 48 85 c0 0f 85 84 00
 RSP: 002b:00007ffe5d33fab8 EFLAGS: 00000202
 RAX: 0000000000000002 RBX: 0000561f72c31460 RCX: 0000561f72c31720
 RDX: 0000000000000002 RSI: 0000561f72c31722 RDI: 0000561f72c31720
 RBP: 000000000000002a R08: 00007ffe5d33fa40 R09: 0000000000000014
 R10: 0000000000000000 R11: 0000000000000246 R12: 0000561f7187e380
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000561f72c31460
  &lt;/TASK&gt;
 Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt intel_rapl_msr iTCO_vendor_support intel_rapl_common joydev virtio_balloon lpc_ich i2c_i801 i2c_smbus pcspkr ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci ghash_clmulni_intel serio_raw libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod
 CR2: 0000000000000018

Ensuring that 'alist' was never zeroed [1] was not sufficient, we need to
remove from the active list those elements that are no more SP nor DRR.

[1] https://lore.kernel.org/netdev/60d274838bf09777f0371253416e8af71360bc08.1633609148.git.dcaratti@redhat.com/

v3: fix race between ets_qdisc_change() and ets_qdisc_dequeue() delisting
    DRR classes beyond 'nbands' in ets_qdisc_change() with the qdisc lock
    acquired, thanks to Cong Wang.

v2: when a NULL qdisc is found in the DRR active list, try to dequeue skb
    from the next list item.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47558</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47558" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Disable Tx queues when reconfiguring the interface

The Tx queues were not disabled in situations where the driver needed to
stop the interface to apply a new configuration. This could result in a
kernel panic when doing any of the 3 following actions:
* reconfiguring the number of queues (ethtool -L)
* reconfiguring the size of the ring buffers (ethtool -G)
* installing/removing an XDP program (ip l set dev ethX xdp)

Prevent the panic by making sure netif_tx_disable is called when stopping
an interface.

Without this patch, the following kernel panic can be observed when doing
any of the actions above:

Unable to handle kernel paging request at virtual address ffff80001238d040
[....]
 Call trace:
  dwmac4_set_addr+0x8/0x10
  dev_hard_start_xmit+0xe4/0x1ac
  sch_direct_xmit+0xe8/0x39c
  __dev_queue_xmit+0x3ec/0xaf0
  dev_queue_xmit+0x14/0x20
[...]
[ end trace 0000000000000002 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()

Coverity reports a possible NULL dereferencing problem:

in smc_vlan_by_tcpsk():
6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).
7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.
1623                ndev = (struct net_device *)netdev_lower_get_next(ndev, &amp;lower);
CID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)
8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.
1624                if (is_vlan_dev(ndev)) {

Remove the manual implementation and use netdev_walk_all_lower_dev() to
iterate over the lower devices. While on it remove an obsolete function
parameter comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47560</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum: Protect driver from buggy firmware

When processing port up/down events generated by the device's firmware,
the driver protects itself from events reported for non-existent local
ports, but not the CPU port (local port 0), which exists, but lacks a
netdev.

This can result in a NULL pointer dereference when calling
netif_carrier_{on,off}().

Fix this by bailing early when processing an event reported for the CPU
port. Problem was only observed when running on top of a buggy emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47562</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47562" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix vsi-&gt;txq_map sizing

The approach of having XDP queue per CPU regardless of user's setting
exposed a hidden bug that could occur in case when Rx queue count differ
from Tx queue count. Currently vsi-&gt;txq_map's size is equal to the
doubled vsi-&gt;alloc_txq, which is not correct due to the fact that XDP
rings were previously based on the Rx queue count. Below splat can be
seen when ethtool -L is used and XDP rings are configured:

[  682.875339] BUG: kernel NULL pointer dereference, address: 000000000000000f
[  682.883403] #PF: supervisor read access in kernel mode
[  682.889345] #PF: error_code(0x0000) - not-present page
[  682.895289] PGD 0 P4D 0
[  682.898218] Oops: 0000 [#1] PREEMPT SMP PTI
[  682.903055] CPU: 42 PID: 2878 Comm: ethtool Tainted: G           OE     5.15.0-rc5+ #1
[  682.912214] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016
[  682.923380] RIP: 0010:devres_remove+0x44/0x130
[  682.928527] Code: 49 89 f4 55 48 89 fd 4c 89 ff 53 48 83 ec 10 e8 92 b9 49 00 48 8b 9d a8 02 00 00 48 8d 8d a0 02 00 00 49 89 c2 48 39 cb 74 0f &lt;4c&gt; 3b 63 10 74 25 48 8b 5b 08 48 39 cb 75 f1 4c 89 ff 4c 89 d6 e8
[  682.950237] RSP: 0018:ffffc90006a679f0 EFLAGS: 00010002
[  682.956285] RAX: 0000000000000286 RBX: ffffffffffffffff RCX: ffff88908343a370
[  682.964538] RDX: 0000000000000001 RSI: ffffffff81690d60 RDI: 0000000000000000
[  682.972789] RBP: ffff88908343a0d0 R08: 0000000000000000 R09: 0000000000000000
[  682.981040] R10: 0000000000000286 R11: 3fffffffffffffff R12: ffffffff81690d60
[  682.989282] R13: ffffffff81690a00 R14: ffff8890819807a8 R15: ffff88908343a36c
[  682.997535] FS:  00007f08c7bfa740(0000) GS:ffff88a03fd00000(0000) knlGS:0000000000000000
[  683.006910] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  683.013557] CR2: 000000000000000f CR3: 0000001080a66003 CR4: 00000000003706e0
[  683.021819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  683.030075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  683.038336] Call Trace:
[  683.041167]  devm_kfree+0x33/0x50
[  683.045004]  ice_vsi_free_arrays+0x5e/0xc0 [ice]
[  683.050380]  ice_vsi_rebuild+0x4c8/0x750 [ice]
[  683.055543]  ice_vsi_recfg_qs+0x9a/0x110 [ice]
[  683.060697]  ice_set_channels+0x14f/0x290 [ice]
[  683.065962]  ethnl_set_channels+0x333/0x3f0
[  683.070807]  genl_family_rcv_msg_doit+0xea/0x150
[  683.076152]  genl_rcv_msg+0xde/0x1d0
[  683.080289]  ? channels_prepare_data+0x60/0x60
[  683.085432]  ? genl_get_cmd+0xd0/0xd0
[  683.089667]  netlink_rcv_skb+0x50/0xf0
[  683.094006]  genl_rcv+0x24/0x40
[  683.097638]  netlink_unicast+0x239/0x340
[  683.102177]  netlink_sendmsg+0x22e/0x470
[  683.106717]  sock_sendmsg+0x5e/0x60
[  683.110756]  __sys_sendto+0xee/0x150
[  683.114894]  ? handle_mm_fault+0xd0/0x2a0
[  683.119535]  ? do_user_addr_fault+0x1f3/0x690
[  683.134173]  __x64_sys_sendto+0x25/0x30
[  683.148231]  do_syscall_64+0x3b/0xc0
[  683.161992]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Fix this by taking into account the value that num_possible_cpus()
yields in addition to vsi-&gt;alloc_txq instead of doubling the latter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47563</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47563" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: avoid bpf_prog refcount underflow

Ice driver has the routines for managing XDP resources that are shared
between ndo_bpf op and VSI rebuild flow. The latter takes place for
example when user changes queue count on an interface via ethtool's
set_channels().

There is an issue around the bpf_prog refcounting when VSI is being
rebuilt - since ice_prepare_xdp_rings() is called with vsi-&gt;xdp_prog as
an argument that is used later on by ice_vsi_assign_bpf_prog(), same
bpf_prog pointers are swapped with each other. Then it is also
interpreted as an 'old_prog' which in turn causes us to call
bpf_prog_put on it that will decrement its refcount.

Below splat can be interpreted in a way that due to zero refcount of a
bpf_prog it is wiped out from the system while kernel still tries to
refer to it:

[  481.069429] BUG: unable to handle page fault for address: ffffc9000640f038
[  481.077390] #PF: supervisor read access in kernel mode
[  481.083335] #PF: error_code(0x0000) - not-present page
[  481.089276] PGD 100000067 P4D 100000067 PUD 1001cb067 PMD 106d2b067 PTE 0
[  481.097141] Oops: 0000 [#1] PREEMPT SMP PTI
[  481.101980] CPU: 12 PID: 3339 Comm: sudo Tainted: G           OE     5.15.0-rc5+ #1
[  481.110840] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016
[  481.122021] RIP: 0010:dev_xdp_prog_id+0x25/0x40
[  481.127265] Code: 80 00 00 00 00 0f 1f 44 00 00 89 f6 48 c1 e6 04 48 01 fe 48 8b 86 98 08 00 00 48 85 c0 74 13 48 8b 50 18 31 c0 48 85 d2 74 07 &lt;48&gt; 8b 42 38 8b 40 20 c3 48 8b 96 90 08 00 00 eb e8 66 2e 0f 1f 84
[  481.148991] RSP: 0018:ffffc90007b63868 EFLAGS: 00010286
[  481.155034] RAX: 0000000000000000 RBX: ffff889080824000 RCX: 0000000000000000
[  481.163278] RDX: ffffc9000640f000 RSI: ffff889080824010 RDI: ffff889080824000
[  481.171527] RBP: ffff888107af7d00 R08: 0000000000000000 R09: ffff88810db5f6e0
[  481.179776] R10: 0000000000000000 R11: ffff8890885b9988 R12: ffff88810db5f4bc
[  481.188026] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  481.196276] FS:  00007f5466d5bec0(0000) GS:ffff88903fb00000(0000) knlGS:0000000000000000
[  481.205633] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  481.212279] CR2: ffffc9000640f038 CR3: 000000014429c006 CR4: 00000000003706e0
[  481.220530] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  481.228771] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  481.237029] Call Trace:
[  481.239856]  rtnl_fill_ifinfo+0x768/0x12e0
[  481.244602]  rtnl_dump_ifinfo+0x525/0x650
[  481.249246]  ? __alloc_skb+0xa5/0x280
[  481.253484]  netlink_dump+0x168/0x3c0
[  481.257725]  netlink_recvmsg+0x21e/0x3e0
[  481.262263]  ____sys_recvmsg+0x87/0x170
[  481.266707]  ? __might_fault+0x20/0x30
[  481.271046]  ? _copy_from_user+0x66/0xa0
[  481.275591]  ? iovec_from_user+0xf6/0x1c0
[  481.280226]  ___sys_recvmsg+0x82/0x100
[  481.284566]  ? sock_sendmsg+0x5e/0x60
[  481.288791]  ? __sys_sendto+0xee/0x150
[  481.293129]  __sys_recvmsg+0x56/0xa0
[  481.297267]  do_syscall_64+0x3b/0xc0
[  481.301395]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  481.307238] RIP: 0033:0x7f5466f39617
[  481.311373] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb bd 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2f 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[  481.342944] RSP: 002b:00007ffedc7f4308 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[  481.361783] RAX: ffffffffffffffda RBX: 00007ffedc7f5460 RCX: 00007f5466f39617
[  481.380278] RDX: 0000000000000000 RSI: 00007ffedc7f5360 RDI: 0000000000000003
[  481.398500] RBP: 00007ffedc7f53f0 R08: 0000000000000000 R09: 000055d556f04d50
[  481.416463] R10: 0000000000000077 R11: 0000000000000246 R12: 00007ffedc7f5360
[  481.434131] R13: 00007ffedc7f5350 R14: 00007ffedc7f5344 R15: 0000000000000e98
[  481.451520] Modules linked in: ice
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227695">SUSE bug 1227695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix double free issue on err path

fix error path handling in prestera_bridge_port_join() that
cases prestera driver to crash (see below).

 Trace:
   Internal error: Oops: 96000044 [#1] SMP
   Modules linked in: prestera_pci prestera uio_pdrv_genirq
   CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1
   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
   pc : prestera_bridge_destroy+0x2c/0xb0 [prestera]
   lr : prestera_bridge_port_join+0x2cc/0x350 [prestera]
   sp : ffff800011a1b0f0
   ...
   x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122
    Call trace:
   prestera_bridge_destroy+0x2c/0xb0 [prestera]
   prestera_bridge_port_join+0x2cc/0x350 [prestera]
   prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera]
   prestera_netdev_event_handler+0xf4/0x110 [prestera]
   raw_notifier_call_chain+0x54/0x80
   call_netdevice_notifiers_info+0x54/0xa0
   __netdev_upper_dev_link+0x19c/0x380
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47565</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix kernel panic during drive powercycle test

While looping over shost's sdev list it is possible that one
of the drives is getting removed and its sas_target object is
freed but its sdev object remains intact.

Consequently, a kernel panic can occur while the driver is trying to access
the sas_address field of sas_target object without also checking the
sas_target object for NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47566" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47566" ref_url="https://www.suse.com/security/cve/CVE-2021-47566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

proc/vmcore: fix clearing user buffer by properly using clear_user()

To clear a user buffer we cannot simply use memset, we have to use
clear_user().  With a virtio-mem device that registers a vmcore_cb and
has some logically unplugged memory inside an added Linux memory block,
I can easily trigger a BUG by copying the vmcore via "cp":

  systemd[1]: Starting Kdump Vmcore Save Service...
  kdump[420]: Kdump is using the default log level(3).
  kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/
  kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/
  kdump[465]: saving vmcore-dmesg.txt complete
  kdump[467]: saving vmcore
  BUG: unable to handle page fault for address: 00007f2374e01000
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0003) - permissions violation
  PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867
  Oops: 0003 [#1] PREEMPT SMP NOPTI
  CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014
  RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86
  Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 &lt;49&gt; c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81
  RSP: 0018:ffffc9000073be08 EFLAGS: 00010212
  RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000
  RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008
  RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50
  R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000
  R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8
  FS:  00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0
  Call Trace:
   read_vmcore+0x236/0x2c0
   proc_reg_read+0x55/0xa0
   vfs_read+0x95/0x190
   ksys_read+0x4f/0xc0
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Some x86-64 CPUs have a CPU feature called "Supervisor Mode Access
Prevention (SMAP)", which is used to detect wrong access from the kernel
to user buffers like this: SMAP triggers a permissions violation on
wrong access.  In the x86-64 variant of clear_user(), SMAP is properly
handled via clac()+stac().

To fix, properly use clear_user() when we're dealing with a user buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47566/">CVE-2021-47566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47566">CVE-2021-47566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225514">SUSE bug 1225514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47569" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47569" ref_url="https://www.suse.com/security/cve/CVE-2021-47569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fail cancellation for EXITING tasks

WARNING: CPU: 1 PID: 20 at fs/io_uring.c:6269 io_try_cancel_userdata+0x3c5/0x640 fs/io_uring.c:6269
CPU: 1 PID: 20 Comm: kworker/1:0 Not tainted 5.16.0-rc1-syzkaller #0
Workqueue: events io_fallback_req_func
RIP: 0010:io_try_cancel_userdata+0x3c5/0x640 fs/io_uring.c:6269
Call Trace:
 &lt;TASK&gt;
 io_req_task_link_timeout+0x6b/0x1e0 fs/io_uring.c:6886
 io_fallback_req_func+0xf9/0x1ae fs/io_uring.c:1334
 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298
 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 &lt;/TASK&gt;

We need original task's context to do cancellations, so if it's dying
and the callback is executed in a fallback mode, fail the cancellation
attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47569/">CVE-2021-47569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47569">CVE-2021-47569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225515">SUSE bug 1225515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47571</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47571" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()

The free_rtllib() function frees the "dev" pointer so there is use
after free on the next line.  Re-arrange things to avoid that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227551">SUSE bug 1227551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47572</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: fix null pointer dereference when IPv6 is not enabled

When we try to add an IPv6 nexthop and IPv6 is not enabled
(!CONFIG_IPV6) we'll hit a NULL pointer dereference[1] in the error path
of nh_create_ipv6() due to calling ipv6_stub-&gt;fib6_nh_release. The bug
has been present since the beginning of IPv6 nexthop gateway support.
Commit 1aefd3de7bc6 ("ipv6: Add fib6_nh_init and release to stubs") tells
us that only fib6_nh_init has a dummy stub because fib6_nh_release should
not be called if fib6_nh_init returns an error, but the commit below added
a call to ipv6_stub-&gt;fib6_nh_release in its error path. To fix it return
the dummy stub's -EAFNOSUPPORT error directly without calling
ipv6_stub-&gt;fib6_nh_release in nh_create_ipv6()'s error path.

[1]
 Output is a bit truncated, but it clearly shows the error.
 BUG: kernel NULL pointer dereference, address: 000000000000000000
 #PF: supervisor instruction fetch in kernel modede
 #PF: error_code(0x0010) - not-present pagege
 PGD 0 P4D 0
 Oops: 0010 [#1] PREEMPT SMP NOPTI
 CPU: 4 PID: 638 Comm: ip Kdump: loaded Not tainted 5.16.0-rc1+ #446
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:0x0
 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
 RSP: 0018:ffff888109f5b8f0 EFLAGS: 00010286^Ac
 RAX: 0000000000000000 RBX: ffff888109f5ba28 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881008a2860
 RBP: ffff888109f5b9d8 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff888109f5b978 R11: ffff888109f5b948 R12: 00000000ffffff9f
 R13: ffff8881008a2a80 R14: ffff8881008a2860 R15: ffff8881008a2840
 FS:  00007f98de70f100(0000) GS:ffff88822bf00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffffffffffd6 CR3: 0000000100efc000 CR4: 00000000000006e0
 Call Trace:
  &lt;TASK&gt;
  nh_create_ipv6+0xed/0x10c
  rtm_new_nexthop+0x6d7/0x13f3
  ? check_preemption_disabled+0x3d/0xf2
  ? lock_is_held_type+0xbe/0xfd
  rtnetlink_rcv_msg+0x23f/0x26a
  ? check_preemption_disabled+0x3d/0xf2
  ? rtnl_calcit.isra.0+0x147/0x147
  netlink_rcv_skb+0x61/0xb2
  netlink_unicast+0x100/0x187
  netlink_sendmsg+0x37f/0x3a0
  ? netlink_unicast+0x187/0x187
  sock_sendmsg_nosec+0x67/0x9b
  ____sys_sendmsg+0x19d/0x1f9
  ? copy_msghdr_from_user+0x4c/0x5e
  ? rcu_read_lock_any_held+0x2a/0x78
  ___sys_sendmsg+0x6c/0x8c
  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
  ? lockdep_hardirqs_on+0xd9/0x102
  ? sockfd_lookup_light+0x69/0x99
  __sys_sendmsg+0x50/0x6e
  do_syscall_64+0xcb/0xf2
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f98dea28914
 Code: 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 48 8d 05 e9 5d 0c 00 8b 00 85 c0 75 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 41 54 41 89 d4 55 48 89 f5 53
 RSP: 002b:00007fff859f5e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e2e
 RAX: ffffffffffffffda RBX: 00000000619cb810 RCX: 00007f98dea28914
 RDX: 0000000000000000 RSI: 00007fff859f5ed0 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000008
 R10: fffffffffffffce6 R11: 0000000000000246 R12: 0000000000000001
 R13: 000055c0097ae520 R14: 000055c0097957fd R15: 00007fff859f63a0
 &lt;/TASK&gt;
 Modules linked in: bridge stp llc bonding virtio_net
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225389">SUSE bug 1225389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47576</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()

In resp_mode_select() sanity check the block descriptor len to avoid UAF.

BUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509
Read of size 1 at addr ffff888026670f50 by task scsicmd/15032

CPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443
 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306
 resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509
 schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483
 scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537
 scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50
 entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47577</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47577" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47577" ref_url="https://www.suse.com/security/cve/CVE-2021-47577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io-wq: check for wq exit after adding new worker task_work

We check IO_WQ_BIT_EXIT before attempting to create a new worker, and
wq exit cancels pending work if we have any. But it's possible to have
a race between the two, where creation checks exit finding it not set,
but we're in the process of exiting. The exit side will cancel pending
creation task_work, but there's a gap where we add task_work after we've
canceled existing creations at exit time.

Fix this by checking the EXIT bit post adding the creation task_work.
If it's set, run the same cancelation that exit does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47577/">CVE-2021-47577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47577">CVE-2021-47577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226538">SUSE bug 1226538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47578</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Don't call kcalloc() if size arg is zero

If the size arg to kcalloc() is zero, it returns ZERO_SIZE_PTR.  Because of
that, for a following NULL pointer check to work on the returned pointer,
kcalloc() must not be called with the size arg equal to zero. Return early
without error before the kcalloc() call if size arg is zero.

BUG: KASAN: null-ptr-deref in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: null-ptr-deref in sg_copy_buffer+0x138/0x240 lib/scatterlist.c:974
Write of size 4 at addr 0000000000000010 by task syz-executor.1/22789

CPU: 1 PID: 22789 Comm: syz-executor.1 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 __kasan_report mm/kasan/report.c:446 [inline]
 kasan_report.cold.14+0x112/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x3b/0x60 mm/kasan/shadow.c:66
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x138/0x240 lib/scatterlist.c:974
 do_dout_fetch drivers/scsi/scsi_debug.c:2954 [inline]
 do_dout_fetch drivers/scsi/scsi_debug.c:2946 [inline]
 resp_verify+0x49e/0x930 drivers/scsi/scsi_debug.c:4276
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 blk_execute_rq+0xdb/0x360 block/blk-exec.c:102
 sg_scsi_ioctl drivers/scsi/scsi_ioctl.c:621 [inline]
 scsi_ioctl+0x8bb/0x15c0 drivers/scsi/scsi_ioctl.c:930
 sg_ioctl_common+0x172d/0x2710 drivers/scsi/sg.c:1112
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47580</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix type in min_t to avoid stack OOB

Change min_t() to use type "u32" instead of type "int" to avoid stack out
of bounds. With min_t() type "int" the values get sign extended and the
larger value gets used causing stack out of bounds.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
Read of size 127 at addr ffff888072607128 by task syz-executor.7/18707

CPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x23/0x60 mm/kasan/shadow.c:65
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
 sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000
 fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162
 fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]
 resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227611">SUSE bug 1227611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47582" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Make do_proc_control() and do_proc_bulk() killable

The USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke
usb_start_wait_urb(), which contains an uninterruptible wait with a
user-specified timeout value.  If timeout value is very large and the
device being accessed does not respond in a reasonable amount of time,
the kernel will complain about "Task X blocked for more than N
seconds", as found in testing by syzbot:

INFO: task syz-executor.0:8700 blocked for more than 143 seconds.
      Not tainted 5.14.0-rc7-syzkaller #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0  state:D stack:23192 pid: 8700 ppid:  8455 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4681 [inline]
 __schedule+0xc07/0x11f0 kernel/sched/core.c:5938
 schedule+0x14b/0x210 kernel/sched/core.c:6017
 schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857
 do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85
 __wait_for_common kernel/sched/completion.c:106 [inline]
 wait_for_common kernel/sched/completion.c:117 [inline]
 wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157
 usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63
 do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236
 proc_bulk drivers/usb/core/devio.c:1273 [inline]
 usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]
 usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713
...

To fix this problem, this patch replaces usbfs's calls to
usb_control_msg() and usb_bulk_msg() with special-purpose code that
does essentially the same thing (as recommended in the comment for
usb_start_wait_urb()), except that it always uses a killable wait and
it uses GFP_KERNEL rather than GFP_NOIO.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47583" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mxl111sf: change mutex_init() location

Syzbot reported, that mxl111sf_ctrl_msg() uses uninitialized
mutex. The problem was in wrong mutex_init() location.

Previous mutex_init(&amp;state-&gt;msg_lock) call was in -&gt;init() function, but
dvb_usbv2_init() has this order of calls:

	dvb_usbv2_init()
	  dvb_usbv2_adapter_init()
	    dvb_usbv2_adapter_frontend_init()
	      props-&gt;frontend_attach()

	  props-&gt;init()

Since mxl111sf_* devices call mxl111sf_ctrl_msg() in -&gt;frontend_attach()
internally we need to initialize state-&gt;msg_lock before
frontend_attach(). To achieve it, -&gt;probe() call added to all mxl111sf_*
devices, which will simply initiaize mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47584</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47584" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iocost: Fix divide-by-zero on donation from low hweight cgroup

The donation calculation logic assumes that the donor has non-zero
after-donation hweight, so the lowest active hweight a donating cgroup can
have is 2 so that it can donate 1 while keeping the other 1 for itself.
Earlier, we only donated from cgroups with sizable surpluses so this
condition was always true. However, with the precise donation algorithm
implemented, f1de2439ec43 ("blk-iocost: revamp donation amount
determination") made the donation amount calculation exact enabling even low
hweight cgroups to donate.

This means that in rare occasions, a cgroup with active hweight of 1 can
enter donation calculation triggering the following warning and then a
divide-by-zero oops.

 WARNING: CPU: 4 PID: 0 at block/blk-iocost.c:1928 transfer_surpluses.cold+0x0/0x53 [884/94867]
 ...
 RIP: 0010:transfer_surpluses.cold+0x0/0x53
 Code: 92 ff 48 c7 c7 28 d1 ab b5 65 48 8b 34 25 00 ae 01 00 48 81 c6 90 06 00 00 e8 8b 3f fe ff 48 c7 c0 ea ff ff ff e9 95 ff 92 ff &lt;0f&gt; 0b 48 c7 c7 30 da ab b5 e8 71 3f fe ff 4c 89 e8 4d 85 ed 74 0
4
 ...
 Call Trace:
  &lt;IRQ&gt;
  ioc_timer_fn+0x1043/0x1390
  call_timer_fn+0xa1/0x2c0
  __run_timers.part.0+0x1ec/0x2e0
  run_timer_softirq+0x35/0x70
 ...
 iocg: invalid donation weights in /a/b: active=1 donating=1 after=0

Fix it by excluding cgroups w/ active hweight &lt; 2 from donating. Excluding
these extreme low hweight donations shouldn't affect work conservation in
any meaningful way.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47585</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47585" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leak in __add_inode_ref()

Line 1169 (#3) allocates a memory chunk for victim_name by kmalloc(),
but  when the function returns in line 1184 (#4) victim_name allocated
by line 1169 (#3) is not freed, which will lead to a memory leak.
There is a similar snippet of code in this function as allocating a memory
chunk for victim_name in line 1104 (#1) as well as releasing the memory
in line 1116 (#2).

We should kfree() victim_name when the return value of backref_in_log()
is less than zero and before the function returns in line 1184 (#4).

1057 static inline int __add_inode_ref(struct btrfs_trans_handle *trans,
1058 				  struct btrfs_root *root,
1059 				  struct btrfs_path *path,
1060 				  struct btrfs_root *log_root,
1061 				  struct btrfs_inode *dir,
1062 				  struct btrfs_inode *inode,
1063 				  u64 inode_objectid, u64 parent_objectid,
1064 				  u64 ref_index, char *name, int namelen,
1065 				  int *search_done)
1066 {

1104 	victim_name = kmalloc(victim_name_len, GFP_NOFS);
	// #1: kmalloc (victim_name-1)
1105 	if (!victim_name)
1106 		return -ENOMEM;

1112	ret = backref_in_log(log_root, &amp;search_key,
1113			parent_objectid, victim_name,
1114			victim_name_len);
1115	if (ret &lt; 0) {
1116		kfree(victim_name); // #2: kfree (victim_name-1)
1117		return ret;
1118	} else if (!ret) {

1169 	victim_name = kmalloc(victim_name_len, GFP_NOFS);
	// #3: kmalloc (victim_name-2)
1170 	if (!victim_name)
1171 		return -ENOMEM;

1180 	ret = backref_in_log(log_root, &amp;search_key,
1181 			parent_objectid, victim_name,
1182 			victim_name_len);
1183 	if (ret &lt; 0) {
1184 		return ret; // #4: missing kfree (victim_name-2)
1185 	} else if (!ret) {

1241 	return 0;
1242 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47586" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup

KASAN reports an out-of-bounds read in rk_gmac_setup on the line:

	while (ops-&gt;regs[i]) {

This happens for most platforms since the regs flexible array member is
empty, so the memory after the ops structure is being read here.  It
seems that mostly this happens to contain zero anyway, so we get lucky
and everything still works.

To avoid adding redundant data to nearly all the ops structures, add a
new flag to indicate whether the regs field is valid and avoid this loop
when it is not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47587</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47587" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: systemport: Add global locking for descriptor lifecycle

The descriptor list is a shared resource across all of the transmit queues, and
the locking mechanism used today only protects concurrency across a given
transmit queue between the transmit and reclaiming. This creates an opportunity
for the SYSTEMPORT hardware to work on corrupted descriptors if we have
multiple producers at once which is the case when using multiple transmit
queues.

This was particularly noticeable when using multiple flows/transmit queues and
it showed up in interesting ways in that UDP packets would get a correct UDP
header checksum being calculated over an incorrect packet length. Similarly TCP
packets would get an equally correct checksum computed by the hardware over an
incorrect packet length.

The SYSTEMPORT hardware maintains an internal descriptor list that it re-arranges
when the driver produces a new descriptor anytime it writes to the
WRITE_PORT_{HI,LO} registers, there is however some delay in the hardware to
re-organize its descriptors and it is possible that concurrent TX queues
eventually break this internal allocation scheme to the point where the
length/status part of the descriptor gets used for an incorrect data buffer.

The fix is to impose a global serialization for all TX queues in the short
section where we are writing to the WRITE_PORT_{HI,LO} registers which solves
the corruption even with multiple concurrent TX queues being used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47588</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47588" ref_url="https://www.suse.com/security/cve/CVE-2021-47588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sit: do not call ipip6_dev_free() from sit_init_net()

ipip6_dev_free is sit dev-&gt;priv_destructor, already called
by register_netdevice() if something goes wrong.

Alternative would be to make ipip6_dev_free() robust against
multiple invocations, but other drivers do not implement this
strategy.

syzbot reported:

dst_release underflow
WARNING: CPU: 0 PID: 5059 at net/core/dst.c:173 dst_release+0xd8/0xe0 net/core/dst.c:173
Modules linked in:
CPU: 1 PID: 5059 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_release+0xd8/0xe0 net/core/dst.c:173
Code: 4c 89 f2 89 d9 31 c0 5b 41 5e 5d e9 da d5 44 f9 e8 1d 90 5f f9 c6 05 87 48 c6 05 01 48 c7 c7 80 44 99 8b 31 c0 e8 e8 67 29 f9 &lt;0f&gt; 0b eb 85 0f 1f 40 00 53 48 89 fb e8 f7 8f 5f f9 48 83 c3 a8 48
RSP: 0018:ffffc9000aa5faa0 EFLAGS: 00010246
RAX: d6894a925dd15a00 RBX: 00000000ffffffff RCX: 0000000000040000
RDX: ffffc90005e19000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: 0000000000000000 R08: ffffffff816a1f42 R09: ffffed1017344f2c
R10: ffffed1017344f2c R11: 0000000000000000 R12: 0000607f462b1358
R13: 1ffffffff1bfd305 R14: ffffe8ffffcb1358 R15: dffffc0000000000
FS:  00007f66c71a2700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f88aaed5058 CR3: 0000000023e0f000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dst_cache_destroy+0x107/0x1e0 net/core/dst_cache.c:160
 ipip6_dev_free net/ipv6/sit.c:1414 [inline]
 sit_init_net+0x229/0x550 net/ipv6/sit.c:1936
 ops_init+0x313/0x430 net/core/net_namespace.c:140
 setup_net+0x35b/0x9d0 net/core/net_namespace.c:326
 copy_net_ns+0x359/0x5c0 net/core/net_namespace.c:470
 create_new_namespaces+0x4ce/0xa00 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0x11e/0x180 kernel/nsproxy.c:226
 ksys_unshare+0x57d/0xb50 kernel/fork.c:3075
 __do_sys_unshare kernel/fork.c:3146 [inline]
 __se_sys_unshare kernel/fork.c:3144 [inline]
 __x64_sys_unshare+0x34/0x40 kernel/fork.c:3144
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f66c882ce99
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f66c71a2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f66c893ff60 RCX: 00007f66c882ce99
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048040200
RBP: 00007f66c8886ff1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff6634832f R14: 00007f66c71a2300 R15: 0000000000022000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47588/">CVE-2021-47588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47588">CVE-2021-47588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226568">SUSE bug 1226568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47589</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47589" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igbvf: fix double free in `igbvf_probe`

In `igbvf_probe`, if register_netdev() fails, the program will go to
label err_hw_init, and then to label err_ioremap. In free_netdev() which
is just below label err_ioremap, there is `list_for_each_entry_safe` and
`netif_napi_del` which aims to delete all entries in `dev-&gt;napi_list`.
The program has added an entry `adapter-&gt;rx_ring-&gt;napi` which is added by
`netif_napi_add` in igbvf_alloc_queues(). However, adapter-&gt;rx_ring has
been freed below label err_hw_init. So this a UAF.

In terms of how to patch the problem, we can refer to igbvf_remove() and
delete the entry before `adapter-&gt;rx_ring`.

The KASAN logs are as follows:

[   35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450
[   35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366
[   35.128360]
[   35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14
[   35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[   35.131749] Call Trace:
[   35.132199]  dump_stack_lvl+0x59/0x7b
[   35.132865]  print_address_description+0x7c/0x3b0
[   35.133707]  ? free_netdev+0x1fd/0x450
[   35.134378]  __kasan_report+0x160/0x1c0
[   35.135063]  ? free_netdev+0x1fd/0x450
[   35.135738]  kasan_report+0x4b/0x70
[   35.136367]  free_netdev+0x1fd/0x450
[   35.137006]  igbvf_probe+0x121d/0x1a10 [igbvf]
[   35.137808]  ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]
[   35.138751]  local_pci_probe+0x13c/0x1f0
[   35.139461]  pci_device_probe+0x37e/0x6c0
[   35.165526]
[   35.165806] Allocated by task 366:
[   35.166414]  ____kasan_kmalloc+0xc4/0xf0
[   35.167117]  foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]
[   35.168078]  igbvf_probe+0x9c5/0x1a10 [igbvf]
[   35.168866]  local_pci_probe+0x13c/0x1f0
[   35.169565]  pci_device_probe+0x37e/0x6c0
[   35.179713]
[   35.179993] Freed by task 366:
[   35.180539]  kasan_set_track+0x4c/0x80
[   35.181211]  kasan_set_free_info+0x1f/0x40
[   35.181942]  ____kasan_slab_free+0x103/0x140
[   35.182703]  kfree+0xe3/0x250
[   35.183239]  igbvf_probe+0x1173/0x1a10 [igbvf]
[   35.184040]  local_pci_probe+0x13c/0x1f0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47590</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47590" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47590" ref_url="https://www.suse.com/security/cve/CVE-2021-47590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix deadlock in __mptcp_push_pending()

__mptcp_push_pending() may call mptcp_flush_join_list() with subflow
socket lock held. If such call hits mptcp_sockopt_sync_all() then
subsequently __mptcp_sockopt_sync() could try to lock the subflow
socket for itself, causing a deadlock.

sysrq: Show Blocked State
task:ss-server       state:D stack:    0 pid:  938 ppid:     1 flags:0x00000000
Call Trace:
 &lt;TASK&gt;
 __schedule+0x2d6/0x10c0
 ? __mod_memcg_state+0x4d/0x70
 ? csum_partial+0xd/0x20
 ? _raw_spin_lock_irqsave+0x26/0x50
 schedule+0x4e/0xc0
 __lock_sock+0x69/0x90
 ? do_wait_intr_irq+0xa0/0xa0
 __lock_sock_fast+0x35/0x50
 mptcp_sockopt_sync_all+0x38/0xc0
 __mptcp_push_pending+0x105/0x200
 mptcp_sendmsg+0x466/0x490
 sock_sendmsg+0x57/0x60
 __sys_sendto+0xf0/0x160
 ? do_wait_intr_irq+0xa0/0xa0
 ? fpregs_restore_userregs+0x12/0xd0
 __x64_sys_sendto+0x20/0x30
 do_syscall_64+0x38/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f9ba546c2d0
RSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0
RDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234
RBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060
R13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8
 &lt;/TASK&gt;

Fix the issue by using __mptcp_flush_join_list() instead of plain
mptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by
Florian. The sockopt sync will be deferred to the workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47590/">CVE-2021-47590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47590">CVE-2021-47590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226565">SUSE bug 1226565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47591" ref_url="https://www.suse.com/security/cve/CVE-2021-47591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: remove tcp ulp setsockopt support

TCP_ULP setsockopt cannot be used for mptcp because its already
used internally to plumb subflow (tcp) sockets to the mptcp layer.

syzbot managed to trigger a crash for mptcp connections that are
in fallback mode:

KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
CPU: 1 PID: 1083 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0
RIP: 0010:tls_build_proto net/tls/tls_main.c:776 [inline]
[..]
 __tcp_set_ulp net/ipv4/tcp_ulp.c:139 [inline]
 tcp_set_ulp+0x428/0x4c0 net/ipv4/tcp_ulp.c:160
 do_tcp_setsockopt+0x455/0x37c0 net/ipv4/tcp.c:3391
 mptcp_setsockopt+0x1b47/0x2400 net/mptcp/sockopt.c:638

Remove support for TCP_ULP setsockopt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47591/">CVE-2021-47591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47591">CVE-2021-47591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226570">SUSE bug 1226570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47592</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix tc flower deletion for VLAN priority Rx steering

To replicate the issue:-

1) Add 1 flower filter for VLAN Priority based frame steering:-
$ IFDEVNAME=eth0
$ tc qdisc add dev $IFDEVNAME ingress
$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \
   map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \
   queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \
   flower vlan_prio 0 hw_tc 0

2) Get the 'pref' id
$ tc filter show dev $IFDEVNAME ingress

3) Delete a specific tc flower record (say pref 49151)
$ tc filter del dev $IFDEVNAME parent ffff: pref 49151

From dmesg, we will observe kernel NULL pointer ooops

[  197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  197.171367] #PF: supervisor read access in kernel mode
[  197.171367] #PF: error_code(0x0000) - not-present page
[  197.171367] PGD 0 P4D 0
[  197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI

&lt;snip&gt;

[  197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]

&lt;snip&gt;

[  197.171367] Call Trace:
[  197.171367]  &lt;TASK&gt;
[  197.171367]  ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]
[  197.171367]  stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]
[  197.171367]  tc_setup_cb_destroy+0xb3/0x180
[  197.171367]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]

The above issue is due to previous incorrect implementation of
tc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()
to get struct flow_rule *rule which is no longer valid for tc filter
delete operation.

  struct flow_rule *rule = flow_cls_offload_flow_rule(cls);
  struct flow_dissector *dissector = rule-&gt;match.dissector;

So, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for
earlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),
this patch introduces stmmac_rfs_entry as driver-side flow_cls_offload
record for 'RX frame steering' tc flower, currently used for VLAN
priority. The implementation has taken consideration for future extension
to include other type RX frame steering such as EtherType based.

v2:
 - Clean up overly extensive backtrace and rewrite git message to better
   explain the kernel NULL pointer issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47593" ref_url="https://www.suse.com/security/cve/CVE-2021-47593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: clear 'kern' flag from fallback sockets

The mptcp ULP extension relies on sk-&gt;sk_sock_kern being set correctly:
It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, "mptcp", 6); from
working for plain tcp sockets (any userspace-exposed socket).

But in case of fallback, accept() can return a plain tcp sk.
In such case, sk is still tagged as 'kernel' and setsockopt will work.

This will crash the kernel, The subflow extension has a NULL ctx-&gt;conn
mptcp socket:

BUG: KASAN: null-ptr-deref in subflow_data_ready+0x181/0x2b0
Call Trace:
 tcp_data_ready+0xf8/0x370
 [..]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47593/">CVE-2021-47593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47593">CVE-2021-47593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226551">SUSE bug 1226551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47594</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47594" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47594" ref_url="https://www.suse.com/security/cve/CVE-2021-47594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: never allow the PM to close a listener subflow

Currently, when deleting an endpoint the netlink PM treverses
all the local MPTCP sockets, regardless of their status.

If an MPTCP listener socket is bound to the IP matching the
delete endpoint, the listener TCP socket will be closed.
That is unexpected, the PM should only affect data subflows.

Additionally, syzbot was able to trigger a NULL ptr dereference
due to the above:

general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 1 PID: 6550 Comm: syz-executor122 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__lock_acquire+0xd7d/0x54a0 kernel/locking/lockdep.c:4897
Code: 0f 0e 41 be 01 00 00 00 0f 86 c8 00 00 00 89 05 69 cc 0f 0e e9 bd 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 f3 2f 00 00 48 81 3b 20 75 17 8f 0f 84 52 f3 ff
RSP: 0018:ffffc90001f2f818 EFLAGS: 00010016
RAX: dffffc0000000000 RBX: 0000000000000018 RCX: 0000000000000000
RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000000 R11: 000000000000000a R12: 0000000000000000
R13: ffff88801b98d700 R14: 0000000000000000 R15: 0000000000000001
FS:  00007f177cd3d700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f177cd1b268 CR3: 000000001dd55000 CR4: 0000000000350ee0
Call Trace:
 &lt;TASK&gt;
 lock_acquire kernel/locking/lockdep.c:5637 [inline]
 lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162
 finish_wait+0xc0/0x270 kernel/sched/wait.c:400
 inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:464 [inline]
 inet_csk_accept+0x7de/0x9d0 net/ipv4/inet_connection_sock.c:497
 mptcp_accept+0xe5/0x500 net/mptcp/protocol.c:2865
 inet_accept+0xe4/0x7b0 net/ipv4/af_inet.c:739
 mptcp_stream_accept+0x2e7/0x10e0 net/mptcp/protocol.c:3345
 do_accept+0x382/0x510 net/socket.c:1773
 __sys_accept4_file+0x7e/0xe0 net/socket.c:1816
 __sys_accept4+0xb0/0x100 net/socket.c:1846
 __do_sys_accept net/socket.c:1864 [inline]
 __se_sys_accept net/socket.c:1861 [inline]
 __x64_sys_accept+0x71/0xb0 net/socket.c:1861
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f177cd8b8e9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f177cd3d308 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 00007f177ce13408 RCX: 00007f177cd8b8e9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007f177ce13400 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f177ce1340c
R13: 00007f177cde1004 R14: 6d705f706374706d R15: 0000000000022000
 &lt;/TASK&gt;

Fix the issue explicitly skipping MPTCP socket in TCP_LISTEN
status.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47594/">CVE-2021-47594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47594">CVE-2021-47594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226560">SUSE bug 1226560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47595</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47595" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_ets: don't remove idle classes from the round-robin list

Shuang reported that the following script:

 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
 2) mausezahn ddd0  -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp &amp;
 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3

crashes systematically when line 2) is commented:

 list_del corruption, ffff8e028404bd30-&gt;next is LIST_POISON1 (dead000000000100)
 ------------[ cut here ]------------
 kernel BUG at lib/list_debug.c:47!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47
 Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff &lt;0f&gt; 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe
 RSP: 0018:ffffae46807a3888 EFLAGS: 00010246
 RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202
 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff
 RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff
 R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800
 R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400
 FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0
 Call Trace:
  &lt;TASK&gt;
  ets_qdisc_change+0x58b/0xa70 [sch_ets]
  tc_modify_qdisc+0x323/0x880
  rtnetlink_rcv_msg+0x169/0x4a0
  netlink_rcv_skb+0x50/0x100
  netlink_unicast+0x1a5/0x280
  netlink_sendmsg+0x257/0x4d0
  sock_sendmsg+0x5b/0x60
  ____sys_sendmsg+0x1f2/0x260
  ___sys_sendmsg+0x7c/0xc0
  __sys_sendmsg+0x57/0xa0
  do_syscall_64+0x3a/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7efdc8031338
 Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55
 RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338
 RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940
 R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001
 R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]
 ---[ end trace f35878d1912655c2 ]---
 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47
 Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff &lt;0f&gt; 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe
 RSP: 0018:ffffae46807a3888 EFLAGS: 00010246
 RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202
 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff
 RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff
 R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800
 R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400
 FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47596</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47596" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg

Currently, the hns3_remove function firstly uninstall client instance,
and then uninstall acceletion engine device. The netdevice is freed in
client instance uninstall process, but acceletion engine device uninstall
process still use it to trace runtime information. This causes a use after
free problem.

So fixes it by check the instance register state to avoid use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47597" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet_diag: fix kernel-infoleak for UDP sockets

KMSAN reported a kernel-infoleak [1], that can exploited
by unpriv users.

After analysis it turned out UDP was not initializing
r-&gt;idiag_expires. Other users of inet_sk_diag_fill()
might make the same mistake in the future, so fix this
in inet_sk_diag_fill().

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:156 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:156 [inline]
 _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 copy_to_iter include/linux/uio.h:155 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3657 [inline]
 netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974
 sock_recvmsg_nosec net/socket.c:944 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 sock_read_iter+0x5a9/0x630 net/socket.c:1035
 call_read_iter include/linux/fs.h:2156 [inline]
 new_sync_read fs/read_write.c:400 [inline]
 vfs_read+0x1631/0x1980 fs/read_write.c:481
 ksys_read+0x28c/0x520 fs/read_write.c:619
 __do_sys_read fs/read_write.c:629 [inline]
 __se_sys_read fs/read_write.c:627 [inline]
 __x64_sys_read+0xdb/0x120 fs/read_write.c:627
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1126 [inline]
 netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245
 __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x1095/0x1360 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x16f3/0x1870 net/netlink/af_netlink.c:1916
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg net/socket.c:724 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1057
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x63f/0xe30 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 312 are uninitialized
Memory access of size 312 starts at ffff88812ab54000
Data copied to user address 0000000020001440

CPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_cake: do not call cake_destroy() from cake_init()

qdiscs are not supposed to call their own destroy() method
from init(), because core stack already does that.

syzbot was able to trigger use after free:

DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline]
WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740
Modules linked in:
CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline]
RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740
Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff &lt;0f&gt; 0b e9 0d f7 ff ff 48 8b 44 24 40 48 8d b8 c8 08 00 00 48 89 f8
RSP: 0018:ffffc9000627f290 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88802315d700 RSI: ffffffff815f1db8 RDI: fffff52000c4fe44
RBP: ffff88818f28e000 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815ebb5e R11: 0000000000000000 R12: 0000000000000000
R13: dffffc0000000000 R14: ffffc9000627f458 R15: 0000000093c30000
FS:  0000555556abc400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fda689c3303 CR3: 000000001cfbb000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 tcf_chain0_head_change_cb_del+0x2e/0x3d0 net/sched/cls_api.c:810
 tcf_block_put_ext net/sched/cls_api.c:1381 [inline]
 tcf_block_put_ext net/sched/cls_api.c:1376 [inline]
 tcf_block_put+0xbc/0x130 net/sched/cls_api.c:1394
 cake_destroy+0x3f/0x80 net/sched/sch_cake.c:2695
 qdisc_create.constprop.0+0x9da/0x10f0 net/sched/sch_api.c:1293
 tc_modify_qdisc+0x4c5/0x1980 net/sched/sch_api.c:1660
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2496
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1bb06badb9
Code: Unable to access opcode bytes at RIP 0x7f1bb06bad8f.
RSP: 002b:00007fff3012a658 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1bb06badb9
RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000003
R10: 0000000000000003 R11: 0000000000000246 R12: 00007fff3012a688
R13: 00007fff3012a6a0 R14: 00007fff3012a6e0 R15: 00000000000013c2
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227471">SUSE bug 1227471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47599" ref_url="https://www.suse.com/security/cve/CVE-2021-47599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: use latest_dev in btrfs_show_devname

The test case btrfs/238 reports the warning below:

 WARNING: CPU: 3 PID: 481 at fs/btrfs/super.c:2509 btrfs_show_devname+0x104/0x1e8 [btrfs]
 CPU: 2 PID: 1 Comm: systemd Tainted: G        W  O 5.14.0-rc1-custom #72
 Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
 Call trace:
   btrfs_show_devname+0x108/0x1b4 [btrfs]
   show_mountinfo+0x234/0x2c4
   m_show+0x28/0x34
   seq_read_iter+0x12c/0x3c4
   vfs_read+0x29c/0x2c8
   ksys_read+0x80/0xec
   __arm64_sys_read+0x28/0x34
   invoke_syscall+0x50/0xf8
   do_el0_svc+0x88/0x138
   el0_svc+0x2c/0x8c
   el0t_64_sync_handler+0x84/0xe4
   el0t_64_sync+0x198/0x19c

Reason:
While btrfs_prepare_sprout() moves the fs_devices::devices into
fs_devices::seed_list, the btrfs_show_devname() searches for the devices
and found none, leading to the warning as in above.

Fix:
latest_dev is updated according to the changes to the device list.
That means we could use the latest_dev-&gt;name to show the device name in
/proc/self/mounts, the pointer will be always valid as it's assigned
before the device is deleted from the list in remove or replace.
The RCU protection is sufficient as the device structure is freed after
synchronization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47599/">CVE-2021-47599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47599">CVE-2021-47599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226571">SUSE bug 1226571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm btree remove: fix use after free in rebalance_children()

Move dm_tm_unlock() after dm_tm_dec().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227472">SUSE bug 1227472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47601" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix an IS_ERR() vs NULL bug

The __get_free_pages() function does not return error pointers it returns
NULL so fix this condition to avoid a NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47602" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: track only QoS data frames for admission control

For admission control, obviously all of that only works for
QoS data frames, otherwise we cannot even access the QoS
field in the header.

Syzbot reported (see below) an uninitialized value here due
to a status of a non-QoS nullfunc packet, which isn't even
long enough to contain the QoS header.

Fix this to only do anything for QoS data packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47603" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: improve robustness of the audit queue handling

If the audit daemon were ever to get stuck in a stopped state the
kernel's kauditd_thread() could get blocked attempting to send audit
records to the userspace audit daemon.  With the kernel thread
blocked it is possible that the audit queue could grow unbounded as
certain audit record generating events must be exempt from the queue
limits else the system enter a deadlock state.

This patch resolves this problem by lowering the kernel thread's
socket sending timeout from MAX_SCHEDULE_TIMEOUT to HZ/10 and tweaks
the kauditd_send_queue() function to better manage the various audit
queues when connection problems occur between the kernel and the
audit daemon.  With this patch, the backlog may temporarily grow
beyond the defined limits when the audit daemon is stopped and the
system is under heavy audit pressure, but kauditd_thread() will
continue to make progress and drain the queues as it would for other
connection problems.  For example, with the audit daemon put into a
stopped state and the system configured to audit every syscall it
was still possible to shutdown the system without a kernel panic,
deadlock, etc.; granted, the system was slow to shutdown but that is
to be expected given the extreme pressure of recording every syscall.

The timeout value of HZ/10 was chosen primarily through
experimentation and this developer's "gut feeling".  There is likely
no one perfect value, but as this scenario is limited in scope (root
privileges would be needed to send SIGSTOP to the audit daemon), it
is likely not worth exposing this as a tunable at present.  This can
always be done at a later date if it proves necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47604</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47604" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47604" ref_url="https://www.suse.com/security/cve/CVE-2021-47604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vduse: check that offset is within bounds in get_config()

This condition checks "len" but it does not check "offset" and that
could result in an out of bounds read if "offset &gt; dev-&gt;config_size".
The problem is that since both variables are unsigned the
"dev-&gt;config_size - offset" subtraction would result in a very high
unsigned value.

I think these checks might not be necessary because "len" and "offset"
are supposed to already have been validated using the
vhost_vdpa_config_validate() function.  But I do not know the code
perfectly, and I like to be safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47604/">CVE-2021-47604 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47604">CVE-2021-47604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226566">SUSE bug 1226566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47605</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47605" ref_url="https://www.suse.com/security/cve/CVE-2021-47605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vduse: fix memory corruption in vduse_dev_ioctl()

The "config.offset" comes from the user.  There needs to a check to
prevent it being out of bounds.  The "config.offset" and
"dev-&gt;config_size" variables are both type u32.  So if the offset if
out of bounds then the "dev-&gt;config_size - config.offset" subtraction
results in a very high u32 value.  The out of bounds offset can result
in memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47605/">CVE-2021-47605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47605">CVE-2021-47605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226579">SUSE bug 1226579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227550">SUSE bug 1227550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47606</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netlink: af_netlink: Prevent empty skb by adding a check on len.

Adding a check on len parameter to avoid empty skb. This prevents a
division error in netem_enqueue function which is caused when skb-&gt;len=0
and skb-&gt;data_len=0 in the randomized corruption step as shown below.

skb-&gt;data[prandom_u32() % skb_headlen(skb)] ^= 1&lt;&lt;(prandom_u32() % 8);

Crash Report:
[  343.170349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family
0 port 6081 - 0
[  343.216110] netem: version 1.3
[  343.235841] divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  343.236680] CPU: 3 PID: 4288 Comm: reproducer Not tainted 5.16.0-rc1+
[  343.237569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS 1.11.0-2.el7 04/01/2014
[  343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem]
[  343.239499] Code: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff
ff 8b 8d 50 ff ff ff 8b 85 58 ff ff ff 48 8b bd 70 ff ff ff 31 d2 2b 4f
74 &lt;f7&gt; f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03
[  343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 00010246
[  343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX:
0000000000000000
[  343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI:
ffff88800f8eda40
[  343.244474] RBP: ffff88800bcd7458 R08: 0000000000000000 R09:
ffffffff94fb8445
[  343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12:
0000000000000000
[  343.246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15:
0000000000000020
[  343.247291] FS:  00007fdde2bd7700(0000) GS:ffff888109780000(0000)
knlGS:0000000000000000
[  343.248350] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4:
00000000000006e0
[  343.250076] Call Trace:
[  343.250423]  &lt;TASK&gt;
[  343.250713]  ? memcpy+0x4d/0x60
[  343.251162]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.251795]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.252443]  netem_enqueue+0xe28/0x33c0 [sch_netem]
[  343.253102]  ? stack_trace_save+0x87/0xb0
[  343.253655]  ? filter_irq_stacks+0xb0/0xb0
[  343.254220]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.254837]  ? __kasan_check_write+0x14/0x20
[  343.255418]  ? _raw_spin_lock+0x88/0xd6
[  343.255953]  dev_qdisc_enqueue+0x50/0x180
[  343.256508]  __dev_queue_xmit+0x1a7e/0x3090
[  343.257083]  ? netdev_core_pick_tx+0x300/0x300
[  343.257690]  ? check_kcov_mode+0x10/0x40
[  343.258219]  ? _raw_spin_unlock_irqrestore+0x29/0x40
[  343.258899]  ? __kasan_init_slab_obj+0x24/0x30
[  343.259529]  ? setup_object.isra.71+0x23/0x90
[  343.260121]  ? new_slab+0x26e/0x4b0
[  343.260609]  ? kasan_poison+0x3a/0x50
[  343.261118]  ? kasan_unpoison+0x28/0x50
[  343.261637]  ? __kasan_slab_alloc+0x71/0x90
[  343.262214]  ? memcpy+0x4d/0x60
[  343.262674]  ? write_comp_data+0x2f/0x90
[  343.263209]  ? __kasan_check_write+0x14/0x20
[  343.263802]  ? __skb_clone+0x5d6/0x840
[  343.264329]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.264958]  dev_queue_xmit+0x1c/0x20
[  343.265470]  netlink_deliver_tap+0x652/0x9c0
[  343.266067]  netlink_unicast+0x5a0/0x7f0
[  343.266608]  ? netlink_attachskb+0x860/0x860
[  343.267183]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.267820]  ? write_comp_data+0x2f/0x90
[  343.268367]  netlink_sendmsg+0x922/0xe80
[  343.268899]  ? netlink_unicast+0x7f0/0x7f0
[  343.269472]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.270099]  ? write_comp_data+0x2f/0x90
[  343.270644]  ? netlink_unicast+0x7f0/0x7f0
[  343.271210]  sock_sendmsg+0x155/0x190
[  343.271721]  ____sys_sendmsg+0x75f/0x8f0
[  343.272262]  ? kernel_sendmsg+0x60/0x60
[  343.272788]  ? write_comp_data+0x2f/0x90
[  343.273332]  ? write_comp_data+0x2f/0x90
[  343.273869]  ___sys_sendmsg+0x10f/0x190
[  343.274405]  ? sendmsg_copy_msghdr+0x80/0x80
[  343.274984]  ? slab_post_alloc_hook+0x70/0x230
[  343.275597]  ? futex_wait_setup+0x240/0x240
[  343.276175]  ? security_file_alloc+0x3e/0x170
[  343.276779]  ? write_comp_d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226555">SUSE bug 1226555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg

The implementation of BPF_CMPXCHG on a high level has the following parameters:

  .-[old-val]                                          .-[new-val]
  BPF_R0 = cmpxchg{32,64}(DST_REG + insn-&gt;off, BPF_R0, SRC_REG)
                          `-[mem-loc]          `-[old-val]

Given a BPF insn can only have two registers (dst, src), the R0 is fixed and
used as an auxilliary register for input (old value) as well as output (returning
old value from memory location). While the verifier performs a number of safety
checks, it misses to reject unprivileged programs where R0 contains a pointer as
old value.

Through brute-forcing it takes about ~16sec on my machine to leak a kernel pointer
with BPF_CMPXCHG. The PoC is basically probing for kernel addresses by storing the
guessed address into the map slot as a scalar, and using the map value pointer as
R0 while SRC_REG has a canary value to detect a matching address.

Fix it by checking R0 for pointers, and reject if that's the case for unprivileged
programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47608</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47608" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix kernel address leakage in atomic fetch

The change in commit 37086bfdc737 ("bpf: Propagate stack bounds to registers
in atomics w/ BPF_FETCH") around check_mem_access() handling is buggy since
this would allow for unprivileged users to leak kernel pointers. For example,
an atomic fetch/and with -1 on a stack destination which holds a spilled
pointer will migrate the spilled register type into a scalar, which can then
be exported out of the program (since scalar != pointer) by dumping it into
a map value.

The original implementation of XADD was preventing this situation by using
a double call to check_mem_access() one with BPF_READ and a subsequent one
with BPF_WRITE, in both cases passing -1 as a placeholder value instead of
register as per XADD semantics since it didn't contain a value fetch. The
BPF_READ also included a check in check_stack_read_fixed_off() which rejects
the program if the stack slot is of __is_pointer_value() if dst_regno &lt; 0.
The latter is to distinguish whether we're dealing with a regular stack spill/
fill or some arithmetical operation which is disallowed on non-scalars, see
also 6e7e63cbb023 ("bpf: Forbid XADD on spilled pointers for unprivileged
users") for more context on check_mem_access() and its handling of placeholder
value -1.

One minimally intrusive option to fix the leak is for the BPF_FETCH case to
initially check the BPF_READ case via check_mem_access() with -1 as register,
followed by the actual load case with non-negative load_reg to propagate
stack bounds to registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47609</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47609" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Fix string overflow in SCPI genpd driver

Without the bound checks for scpi_pd-&gt;name, it could result in the buffer
overflow when copying the SCPI device name from the corresponding device
tree node as the name string is set at maximum size of 30.

Let us fix it by using devm_kasprintf so that the string buffer is
allocated dynamically.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47610" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47610" ref_url="https://www.suse.com/security/cve/CVE-2021-47610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix null ptr access msm_ioctl_gem_submit()

Fix the below null pointer dereference in msm_ioctl_gem_submit():

 26545.260705:   Call trace:
 26545.263223:    kref_put+0x1c/0x60
 26545.266452:    msm_ioctl_gem_submit+0x254/0x744
 26545.270937:    drm_ioctl_kernel+0xa8/0x124
 26545.274976:    drm_ioctl+0x21c/0x33c
 26545.278478:    drm_compat_ioctl+0xdc/0xf0
 26545.282428:    __arm64_compat_sys_ioctl+0xc8/0x100
 26545.287169:    el0_svc_common+0xf8/0x250
 26545.291025:    do_el0_svc_compat+0x28/0x54
 26545.295066:    el0_svc_compat+0x10/0x1c
 26545.298838:    el0_sync_compat_handler+0xa8/0xcc
 26545.303403:    el0_sync_compat+0x188/0x1c0
 26545.307445:   Code: d503201f d503201f 52800028 4b0803e8 (b8680008)
 26545.318799:   Kernel panic - not syncing: Oops: Fatal exception
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47610/">CVE-2021-47610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47610">CVE-2021-47610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226581">SUSE bug 1226581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47611</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: validate extended element ID is present

Before attempting to parse an extended element, verify that
the extended element ID is present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47612</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47612" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: fix segfault in nfc_genl_dump_devices_done

When kmalloc in nfc_genl_dump_devices() fails then
nfc_genl_dump_devices_done() segfaults as below

KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:klist_iter_exit+0x26/0x80
Call Trace:
&lt;TASK&gt;
class_dev_iter_exit+0x15/0x20
nfc_genl_dump_devices_done+0x3b/0x50
genl_lock_done+0x84/0xd0
netlink_sock_destruct+0x8f/0x270
__sk_destruct+0x64/0x3b0
sk_destruct+0xa8/0xd0
__sk_free+0x2e8/0x3d0
sk_free+0x51/0x90
netlink_sock_destruct_work+0x1c/0x20
process_one_work+0x411/0x710
worker_thread+0x6fd/0xa80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47614</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47614" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix a user-after-free in add_pble_prm

When irdma_hmc_sd_one fails, 'chunk' is freed while its still on the PBLE
info list.

Add the chunk entry to the PBLE info list only after successful setting of
the SD in irdma_hmc_sd_one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47615" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47616</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47616" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA: Fix use-after-free in rxe_queue_cleanup

On error handling path in rxe_qp_from_init() qp-&gt;sq.queue is freed and
then rxe_create_qp() will drop last reference to this object. qp clean up
function will try to free this queue one time and it causes UAF bug.

Fix it by zeroing queue pointer after freeing queue in rxe_qp_from_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47617</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47617" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: pciehp: Fix infinite loop in IRQ handler upon power fault

The Power Fault Detected bit in the Slot Status register differs from
all other hotplug events in that it is sticky:  It can only be cleared
after turning off slot power.  Per PCIe r5.0, sec. 6.7.1.8:

  If a power controller detects a main power fault on the hot-plug slot,
  it must automatically set its internal main power fault latch [...].
  The main power fault latch is cleared when software turns off power to
  the hot-plug slot.

The stickiness used to cause interrupt storms and infinite loops which
were fixed in 2009 by commits 5651c48cfafe ("PCI pciehp: fix power fault
interrupt storm problem") and 99f0169c17f3 ("PCI: pciehp: enable
software notification on empty slots").

Unfortunately in 2020 the infinite loop issue was inadvertently
reintroduced by commit 8edf5332c393 ("PCI: pciehp: Fix MSI interrupt
race"):  The hardirq handler pciehp_isr() clears the PFD bit until
pciehp's power_fault_detected flag is set.  That happens in the IRQ
thread pciehp_ist(), which never learns of the event because the hardirq
handler is stuck in an infinite loop.  Fix by setting the
power_fault_detected flag already in the hardirq handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47618</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9170/1: fix panic when kasan and kprobe are enabled

arm32 uses software to simulate the instruction replaced
by kprobe. some instructions may be simulated by constructing
assembly functions. therefore, before executing instruction
simulation, it is necessary to construct assembly function
execution environment in C language through binding registers.
after kasan is enabled, the register binding relationship will
be destroyed, resulting in instruction simulation errors and
causing kernel panic.

the kprobe emulate instruction function is distributed in three
files: actions-common.c actions-arm.c actions-thumb.c, so disable
KASAN when compiling these files.

for example, use kprobe insert on cap_capable+20 after kasan
enabled, the cap_capable assembly code is as follows:
&lt;cap_capable&gt;:
e92d47f0	push	{r4, r5, r6, r7, r8, r9, sl, lr}
e1a05000	mov	r5, r0
e280006c	add	r0, r0, #108    ; 0x6c
e1a04001	mov	r4, r1
e1a06002	mov	r6, r2
e59fa090	ldr	sl, [pc, #144]  ;
ebfc7bf8	bl	c03aa4b4 &lt;__asan_load4&gt;
e595706c	ldr	r7, [r5, #108]  ; 0x6c
e2859014	add	r9, r5, #20
......
The emulate_ldr assembly code after enabling kasan is as follows:
c06f1384 &lt;emulate_ldr&gt;:
e92d47f0	push	{r4, r5, r6, r7, r8, r9, sl, lr}
e282803c	add	r8, r2, #60     ; 0x3c
e1a05000	mov	r5, r0
e7e37855	ubfx	r7, r5, #16, #4
e1a00008	mov	r0, r8
e1a09001	mov	r9, r1
e1a04002	mov	r4, r2
ebf35462	bl	c03c6530 &lt;__asan_load4&gt;
e357000f	cmp	r7, #15
e7e36655	ubfx	r6, r5, #12, #4
e205a00f	and	sl, r5, #15
0a000001	beq	c06f13bc &lt;emulate_ldr+0x38&gt;
e0840107	add	r0, r4, r7, lsl #2
ebf3545c	bl	c03c6530 &lt;__asan_load4&gt;
e084010a	add	r0, r4, sl, lsl #2
ebf3545a	bl	c03c6530 &lt;__asan_load4&gt;
e2890010	add	r0, r9, #16
ebf35458	bl	c03c6530 &lt;__asan_load4&gt;
e5990010	ldr	r0, [r9, #16]
e12fff30	blx	r0
e356000f	cm	r6, #15
1a000014	bne	c06f1430 &lt;emulate_ldr+0xac&gt;
e1a06000	mov	r6, r0
e2840040	add	r0, r4, #64     ; 0x40
......

when running in emulate_ldr to simulate the ldr instruction, panic
occurred, and the log is as follows:
Unable to handle kernel NULL pointer dereference at virtual address
00000090
pgd = ecb46400
[00000090] *pgd=2e0fa003, *pmd=00000000
Internal error: Oops: 206 [#1] SMP ARM
PC is at cap_capable+0x14/0xb0
LR is at emulate_ldr+0x50/0xc0
psr: 600d0293 sp : ecd63af8  ip : 00000004  fp : c0a7c30c
r10: 00000000  r9 : c30897f4  r8 : ecd63cd4
r7 : 0000000f  r6 : 0000000a  r5 : e59fa090  r4 : ecd63c98
r3 : c06ae294  r2 : 00000000  r1 : b7611300  r0 : bf4ec008
Flags: nZCv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 32c5387d  Table: 2d546400  DAC: 55555555
Process bash (pid: 1643, stack limit = 0xecd60190)
(cap_capable) from (kprobe_handler+0x218/0x340)
(kprobe_handler) from (kprobe_trap_handler+0x24/0x48)
(kprobe_trap_handler) from (do_undefinstr+0x13c/0x364)
(do_undefinstr) from (__und_svc_finish+0x0/0x30)
(__und_svc_finish) from (cap_capable+0x18/0xb0)
(cap_capable) from (cap_vm_enough_memory+0x38/0x48)
(cap_vm_enough_memory) from
(security_vm_enough_memory_mm+0x48/0x6c)
(security_vm_enough_memory_mm) from
(copy_process.constprop.5+0x16b4/0x25c8)
(copy_process.constprop.5) from (_do_fork+0xe8/0x55c)
(_do_fork) from (SyS_clone+0x1c/0x24)
(SyS_clone) from (__sys_trace_return+0x0/0x10)
Code: 0050a0e1 6c0080e2 0140a0e1 0260a0e1 (f801f0e7)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47619</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47619" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix queues reservation for XDP

When XDP was configured on a system with large number of CPUs
and X722 NIC there was a call trace with NULL pointer dereference.

i40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12
i40e 0000:87:00.0: setup of MAIN VSI failed

BUG: kernel NULL pointer dereference, address: 0000000000000000
RIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]
Call Trace:
? i40e_reconfig_rss_queues+0x130/0x130 [i40e]
dev_xdp_install+0x61/0xe0
dev_xdp_attach+0x18a/0x4c0
dev_change_xdp_fd+0x1e6/0x220
do_setlink+0x616/0x1030
? ahci_port_stop+0x80/0x80
? ata_qc_issue+0x107/0x1e0
? lock_timer_base+0x61/0x80
? __mod_timer+0x202/0x380
rtnl_setlink+0xe5/0x170
? bpf_lsm_binder_transaction+0x10/0x10
? security_capable+0x36/0x50
rtnetlink_rcv_msg+0x121/0x350
? rtnl_calcit.isra.0+0x100/0x100
netlink_rcv_skb+0x50/0xf0
netlink_unicast+0x1d3/0x2a0
netlink_sendmsg+0x22a/0x440
sock_sendmsg+0x5e/0x60
__sys_sendto+0xf0/0x160
? __sys_getsockname+0x7e/0xc0
? _copy_from_user+0x3c/0x80
? __sys_setsockopt+0xc8/0x1a0
__x64_sys_sendto+0x20/0x30
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f83fa7a39e0

This was caused by PF queue pile fragmentation due to
flow director VSI queue being placed right after main VSI.
Because of this main VSI was not able to resize its
queue allocation for XDP resulting in no queues allocated
for main VSI when XDP was turned on.

Fix this by always allocating last queue in PF queue pile
for a flow director VSI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47620</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47620" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: refactor malicious adv data check

Check for out-of-bound read was being performed at the end of while
num_reports loop, and would fill journal with false positives. Added
check to beginning of loop processing so that it doesn't get checked
after ptr has been advanced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-10-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: Fix a deadlock in the error handler

The following deadlock has been observed on a test setup:

 - All tags allocated

 - The SCSI error handler calls ufshcd_eh_host_reset_handler()

 - ufshcd_eh_host_reset_handler() queues work that calls
   ufshcd_err_handler()

 - ufshcd_err_handler() locks up as follows:

Workqueue: ufs_eh_wq_0 ufshcd_err_handler.cfi_jt
Call trace:
 __switch_to+0x298/0x5d8
 __schedule+0x6cc/0xa94
 schedule+0x12c/0x298
 blk_mq_get_tag+0x210/0x480
 __blk_mq_alloc_request+0x1c8/0x284
 blk_get_request+0x74/0x134
 ufshcd_exec_dev_cmd+0x68/0x640
 ufshcd_verify_dev_init+0x68/0x35c
 ufshcd_probe_hba+0x12c/0x1cb8
 ufshcd_host_reset_and_restore+0x88/0x254
 ufshcd_reset_and_restore+0xd0/0x354
 ufshcd_err_handler+0x408/0xc58
 process_one_work+0x24c/0x66c
 worker_thread+0x3e8/0xa4c
 kthread+0x150/0x1b4
 ret_from_fork+0x10/0x30

Fix this lockup by making ufshcd_exec_dev_cmd() allocate a reserved
request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47623</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47623" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47623" ref_url="https://www.suse.com/security/cve/CVE-2021-47623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/fixmap: Fix VM debug warning on unmap

Unmapping a fixmap entry is done by calling __set_fixmap()
with FIXMAP_PAGE_CLEAR as flags.

Today, powerpc __set_fixmap() calls map_kernel_page().

map_kernel_page() is not happy when called a second time
for the same page.

	WARNING: CPU: 0 PID: 1 at arch/powerpc/mm/pgtable.c:194 set_pte_at+0xc/0x1e8
	CPU: 0 PID: 1 Comm: swapper Not tainted 5.16.0-rc3-s3k-dev-01993-g350ff07feb7d-dirty #682
	NIP:  c0017cd4 LR: c00187f0 CTR: 00000010
	REGS: e1011d50 TRAP: 0700   Not tainted  (5.16.0-rc3-s3k-dev-01993-g350ff07feb7d-dirty)
	MSR:  00029032 &lt;EE,ME,IR,DR,RI&gt;  CR: 42000208  XER: 00000000

	GPR00: c0165fec e1011e10 c14c0000 c0ee2550 ff800000 c0f3d000 00000000 c001686c
	GPR08: 00001000 b00045a9 00000001 c0f58460 c0f50000 00000000 c0007e10 00000000
	GPR16: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
	GPR24: 00000000 00000000 c0ee2550 00000000 c0f57000 00000ff8 00000000 ff800000
	NIP [c0017cd4] set_pte_at+0xc/0x1e8
	LR [c00187f0] map_kernel_page+0x9c/0x100
	Call Trace:
	[e1011e10] [c0736c68] vsnprintf+0x358/0x6c8 (unreliable)
	[e1011e30] [c0165fec] __set_fixmap+0x30/0x44
	[e1011e40] [c0c13bdc] early_iounmap+0x11c/0x170
	[e1011e70] [c0c06cb0] ioremap_legacy_serial_console+0x88/0xc0
	[e1011e90] [c0c03634] do_one_initcall+0x80/0x178
	[e1011ef0] [c0c0385c] kernel_init_freeable+0xb4/0x250
	[e1011f20] [c0007e34] kernel_init+0x24/0x140
	[e1011f30] [c0016268] ret_from_kernel_thread+0x5c/0x64
	Instruction dump:
	7fe3fb78 48019689 80010014 7c630034 83e1000c 5463d97e 7c0803a6 38210010
	4e800020 81250000 712a0001 41820008 &lt;0fe00000&gt; 9421ffe0 93e1001c 48000030

Implement unmap_kernel_page() which clears an existing pte.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47623/">CVE-2021-47623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47623">CVE-2021-47623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227919">SUSE bug 1227919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47624</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47624" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change

The refcount leak issues take place in an error handling path. When the
3rd argument buf doesn't match with "offline", "online" or "remove", the
function simply returns -EINVAL and forgets to decrease the reference
count of a rpc_xprt object and a rpc_xprt_switch object increased by
rpc_sysfs_xprt_kobj_get_xprt() and
rpc_sysfs_xprt_kobj_get_xprt_switch(), causing reference count leaks of
both unused objects.

Fix this issue by jumping to the error handling path labelled with
out_put when buf matches none of "offline", "online" or "remove".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0500</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0500" ref_url="https://www.suse.com/security/cve/CVE-2022-0500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel's BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0500/">CVE-2022-0500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196811">SUSE bug 1196811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1210</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1210" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2379-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035886.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-26"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198146">SUSE bug 1198146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817821" comment="libjbig2-2.1-150000.3.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151938" comment="libjbig2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1622" ref_url="https://www.suse.com/security/cve/CVE-2022-1622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    LibTIFF master branch has an out-of-bounds read in LZWDecode in libtiff/tif_lzw.c:619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit b4e79bfa.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1622/">CVE-2022-1622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1622">CVE-2022-1622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199483">SUSE bug 1199483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1996</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1996" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2002-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HVVWQ7QWDT7GBZUAYXIWYZURAWKCEVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFXT5GO737TPBRXIUOZS7A3WOJKWSJAX/" source="SUSE-SU"/>
    <description>
    Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-12-17"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942538" comment="containerd-1.7.21-150000.117.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813861" comment="runc-1.1.10-150000.55.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23222</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23222" ref_url="https://www.suse.com/security/cve/CVE-2022-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23222/">CVE-2022-23222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23820</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23820" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Failure to validate the AMD SMM communication buffer
may allow an attacker to corrupt the SMRAM potentially leading to arbitrary
code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217557">SUSE bug 1217557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220057">SUSE bug 1220057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220058">SUSE bug 1220058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221588">SUSE bug 1221588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23830" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23830" ref_url="https://www.suse.com/security/cve/CVE-2022-23830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23830/">CVE-2022-23830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23830">CVE-2022-23830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
		<reference ref_id="TID000020668" ref_url="https://www.suse.com/support/kb/doc/?id=000020668" source="SUSE-SU"/>
    <description>
    There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198458">SUSE bug 1198458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205065">SUSE bug 1205065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205066">SUSE bug 1205066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205831">SUSE bug 1205831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3435</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38457</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39377</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39377" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020063.html" source="SUSE-SU"/>
    <description>
    sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205224">SUSE bug 1205224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211507">SUSE bug 1211507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009959147" comment="sysstat-12.0.2-150000.3.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247516" comment="sysstat is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40090" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214680">SUSE bug 1214680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40133</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036524.html" source="SUSE-SU"/>
    <description>
    Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810448" comment="python3-setuptools-44.1.1-150400.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303048" comment="python3-setuptools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42265</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42265" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42265" ref_url="https://www.suse.com/security/cve/CVE-2022-42265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018095.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer (nvidia.ko), where an integer overflow may lead to information disclosure or data tampering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42265/">CVE-2022-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42265">CVE-2022-42265 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849752" comment="kernel-firmware-nvidia-gspx-G06-550.54.14-150500.11.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849758" comment="nvidia-open-driver-G06-signed-kmp-default-550.54.14_k5.14.21_150500.55.49-150500.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4382</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4382" ref_url="https://www.suse.com/security/cve/CVE-2022-4382" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4382/">CVE-2022-4382 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206363">SUSE bug 1206363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3822-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016735.html" source="SUSE-SU"/>
    <description>
    A Cleartext Storage of Sensitive Information vulnerability in suppportutils of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 15 SP3 allows attackers that get access to the support logs to gain knowledge of the stored credentials This issue affects: SUSE Linux Enterprise Server 12 supportutils version 3.0.10-95.51.1CWE-312: Cleartext Storage of Sensitive Information and prior versions. SUSE Linux Enterprise Server 15 supportutils version 3.1.21-150000.5.44.1 and prior versions. SUSE Linux Enterprise Server 15 SP3 supportutils version 3.1.21-150300.7.35.15.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207598">SUSE bug 1207598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009781703" comment="supportutils-3.1.26-150300.7.35.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245545" comment="supportutils is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212292">SUSE bug 1212292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4603" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035885.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A vulnerability classified as problematic has been found in ppp. Affected is the function dumpppp of the file pppdump/pppdump.c of the component pppdump. The manipulation of the argument spkt.buf/rpkt.buf leads to improper validation of array index. The real existence of this vulnerability is still doubted at the moment. The name of the patch is a75fb7b198eed50d769c80c36629f38346882cbf. It is recommended to apply a patch to fix this issue. VDB-216198 is the identifier assigned to this vulnerability. NOTE: pppdump is not used in normal process of setting up a PPP connection, is not installed setuid-root, and is not invoked automatically in any scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-23"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218251">SUSE bug 1218251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817822" comment="ppp-2.4.7-150000.5.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152115" comment="ppp is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    A double-free flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209672">SUSE bug 1209672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in compare_digest in Lib/hmac.py in Python through 3.9.1. Constant-time-defeating optimisations were possible in the accumulator variable in hmac.compare_digest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851284" comment="libpython3_6m1_0-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851285" comment="python3-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851286" comment="python3-base-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2077-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035954.html" source="SUSE-SU"/>
    <description>
    In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219276">SUSE bug 1219276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220293">SUSE bug 1220293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868392" comment="gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868393" comment="libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868394" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48624</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034922.html" source="SUSE-SU"/>
    <description>
    close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219901">SUSE bug 1219901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223303">SUSE bug 1223303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224875">SUSE bug 1224875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854018" comment="less-590-150400.3.6.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177208" comment="less is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48626</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

moxart: fix potential use-after-free on remove path

It was reported that the mmc host structure could be accessed after it
was freed in moxart_remove(), so fix this by saving the base register of
the device and using it instead of the pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48627</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix memory overlapping when deleting chars in the buffer

A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.

Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48628</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: drop messages from MDS when unmounting

When unmounting all the dirty buffers will be flushed and after
the last osd request is finished the last reference of the i_count
will be released. Then it will flush the dirty cap/snap to MDSs,
and the unmounting won't wait the possible acks, which will ihold
the inodes when updating the metadata locally but makes no sense
any more, of this. This will make the evict_inodes() to skip these
inodes.

If encrypt is enabled the kernel generate a warning when removing
the encrypt keys when the skipped inodes still hold the keyring:

WARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0
CPU: 4 PID: 168846 Comm: umount Tainted: G S  6.1.0-rc5-ceph-g72ead199864c #1
Hardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015
RIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0
RSP: 0018:ffffc9000b277e28 EFLAGS: 00010202
RAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00
RDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000
RBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000
R10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40
R13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000
FS:  00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
generic_shutdown_super+0x47/0x120
kill_anon_super+0x14/0x30
ceph_kill_sb+0x36/0x90 [ceph]
deactivate_locked_super+0x29/0x60
cleanup_mnt+0xb8/0x140
task_work_run+0x67/0xb0
exit_to_user_mode_prepare+0x23d/0x240
syscall_exit_to_user_mode+0x25/0x60
do_syscall_64+0x40/0x80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fd83dc39e9b

Later the kernel will crash when iput() the inodes and dereferencing
the "sb-&gt;s_master_keys", which has been released by the
generic_shutdown_super().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220848">SUSE bug 1220848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qcom-rng - ensure buffer for generate is completely filled

The generate function in struct rng_alg expects that the destination
buffer is completely filled if the function returns 0. qcom_rng_read()
can run into a situation where the buffer is partially filled with
randomness and the remaining part of the buffer is zeroed since
qcom_rng_generate() doesn't check the return value. This issue can
be reproduced by running the following from libkcapi:

    kcapi-rng -b 9000000 &gt; OUTFILE

The generated OUTFILE will have three huge sections that contain all
zeros, and this is caused by the code where the test
'val &amp; PRNG_STATUS_DATA_AVAIL' fails.

Let's fix this issue by ensuring that qcom_rng_read() always returns
with a full buffer if the function returns success. Let's also have
qcom_rng_generate() return the correct value.

Here's some statistics from the ent project
(https://www.fourmilab.ch/random/) that shows information about the
quality of the generated numbers:

    $ ent -c qcom-random-before
    Value Char Occurrences Fraction
      0           606748   0.067416
      1            33104   0.003678
      2            33001   0.003667
    ...
    253   �        32883   0.003654
    254   �        33035   0.003671
    255   �        33239   0.003693

    Total:       9000000   1.000000

    Entropy = 7.811590 bits per byte.

    Optimum compression would reduce the size
    of this 9000000 byte file by 2 percent.

    Chi square distribution for 9000000 samples is 9329962.81, and
    randomly would exceed this value less than 0.01 percent of the
    times.

    Arithmetic mean value of data bytes is 119.3731 (127.5 = random).
    Monte Carlo value for Pi is 3.197293333 (error 1.77 percent).
    Serial correlation coefficient is 0.159130 (totally uncorrelated =
    0.0).

Without this patch, the results of the chi-square test is 0.01%, and
the numbers are certainly not random according to ent's project page.
The results improve with this patch:

    $ ent -c qcom-random-after
    Value Char Occurrences Fraction
      0            35432   0.003937
      1            35127   0.003903
      2            35424   0.003936
    ...
    253   �        35201   0.003911
    254   �        34835   0.003871
    255   �        35368   0.003930

    Total:       9000000   1.000000

    Entropy = 7.999979 bits per byte.

    Optimum compression would reduce the size
    of this 9000000 byte file by 0 percent.

    Chi square distribution for 9000000 samples is 258.77, and randomly
    would exceed this value 42.24 percent of the times.

    Arithmetic mean value of data bytes is 127.5006 (127.5 = random).
    Monte Carlo value for Pi is 3.141277333 (error 0.01 percent).
    Serial correlation coefficient is 0.000468 (totally uncorrelated =
    0.0).

This change was tested on a Nexus 5 phone (msm8974 SoC).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48630</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ

The commit referenced in the Fixes tag removed the 'break' from the else
branch in qcom_rng_read(), causing an infinite loop whenever 'max' is
not a multiple of WORD_SZ. This can be reproduced e.g. by running:

    kcapi-rng -b 67 &gt;/dev/null

There are many ways to fix this without adding back the 'break', but
they all seem more awkward than simply adding it back, so do just that.

Tested on a machine with Qualcomm Amberwing processor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48631</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0

When walking through an inode extents, the ext4_ext_binsearch_idx() function
assumes that the extent header has been previously validated.  However, there
are no checks that verify that the number of entries (eh-&gt;eh_entries) is
non-zero when depth is &gt; 0.  And this will lead to problems because the
EXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:

[  135.245946] ------------[ cut here ]------------
[  135.247579] kernel BUG at fs/ext4/extents.c:2258!
[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP
[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4
[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014
[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0
[  135.256475] Code:
[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246
[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023
[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c
[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c
[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024
[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000
[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0
[  135.277952] Call Trace:
[  135.278635]  &lt;TASK&gt;
[  135.279247]  ? preempt_count_add+0x6d/0xa0
[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0
[  135.281612]  ? _raw_read_unlock+0x18/0x30
[  135.282704]  ext4_map_blocks+0x294/0x5a0
[  135.283745]  ? xa_load+0x6f/0xa0
[  135.284562]  ext4_mpage_readpages+0x3d6/0x770
[  135.285646]  read_pages+0x67/0x1d0
[  135.286492]  ? folio_add_lru+0x51/0x80
[  135.287441]  page_cache_ra_unbounded+0x124/0x170
[  135.288510]  filemap_get_pages+0x23d/0x5a0
[  135.289457]  ? path_openat+0xa72/0xdd0
[  135.290332]  filemap_read+0xbf/0x300
[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40
[  135.292192]  new_sync_read+0x103/0x170
[  135.293014]  vfs_read+0x15d/0x180
[  135.293745]  ksys_read+0xa1/0xe0
[  135.294461]  do_syscall_64+0x3c/0x80
[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0

This patch simply adds an extra check in __ext4_ext_check(), verifying that
eh_entries is not 0 when eh_depth is &gt; 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48632</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()

memcpy() is called in a loop while 'operation-&gt;length' upper bound
is not checked and 'data_idx' also increments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48633</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48633" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48633" ref_url="https://www.suse.com/security/cve/CVE-2022-48633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix WARN_ON(lock-&gt;magic != lock) error

psb_gem_unpin() calls dma_resv_lock() but the underlying ww_mutex
gets destroyed by drm_gem_object_release() move the
drm_gem_object_release() call in psb_gem_free_object() to after
the unpin to fix the below warning:

[   79.693962] ------------[ cut here ]------------
[   79.693992] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
[   79.694015] WARNING: CPU: 0 PID: 240 at kernel/locking/mutex.c:582 __ww_mutex_lock.constprop.0+0x569/0xfb0
[   79.694052] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer qrtr bnep ath9k ath9k_common ath9k_hw snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel ath3k snd_intel_dspcfg mac80211 snd_intel_sdw_acpi btusb snd_hda_codec btrtl btbcm btintel btmtk bluetooth at24 snd_hda_core snd_hwdep uvcvideo snd_seq libarc4 videobuf2_vmalloc ath videobuf2_memops videobuf2_v4l2 videobuf2_common snd_seq_device videodev acer_wmi intel_powerclamp coretemp mc snd_pcm joydev sparse_keymap ecdh_generic pcspkr wmi_bmof cfg80211 i2c_i801 i2c_smbus snd_timer snd r8169 rfkill lpc_ich soundcore acpi_cpufreq zram rtsx_pci_sdmmc mmc_core serio_raw rtsx_pci gma500_gfx(E) video wmi ip6_tables ip_tables i2c_dev fuse
[   79.694436] CPU: 0 PID: 240 Comm: plymouthd Tainted: G        W   E      6.0.0-rc3+ #490
[   79.694457] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013
[   79.694469] RIP: 0010:__ww_mutex_lock.constprop.0+0x569/0xfb0
[   79.694496] Code: ff 85 c0 0f 84 15 fb ff ff 8b 05 ca 3c 11 01 85 c0 0f 85 07 fb ff ff 48 c7 c6 30 cb 84 aa 48 c7 c7 a3 e1 82 aa e8 ac 29 f8 ff &lt;0f&gt; 0b e9 ed fa ff ff e8 5b 83 8a ff 85 c0 74 10 44 8b 0d 98 3c 11
[   79.694513] RSP: 0018:ffffad1dc048bbe0 EFLAGS: 00010282
[   79.694623] RAX: 0000000000000028 RBX: 0000000000000000 RCX: 0000000000000000
[   79.694636] RDX: 0000000000000001 RSI: ffffffffaa8b0ffc RDI: 00000000ffffffff
[   79.694650] RBP: ffffad1dc048bc80 R08: 0000000000000000 R09: ffffad1dc048ba90
[   79.694662] R10: 0000000000000003 R11: ffffffffaad62fe8 R12: ffff9ff302103138
[   79.694675] R13: ffff9ff306ec8000 R14: ffff9ff307779078 R15: ffff9ff3014c0270
[   79.694690] FS:  00007ff1cccf1740(0000) GS:ffff9ff3bc200000(0000) knlGS:0000000000000000
[   79.694705] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   79.694719] CR2: 0000559ecbcb4420 CR3: 0000000013210000 CR4: 00000000000006f0
[   79.694734] Call Trace:
[   79.694749]  &lt;TASK&gt;
[   79.694761]  ? __schedule+0x47f/0x1670
[   79.694796]  ? psb_gem_unpin+0x27/0x1a0 [gma500_gfx]
[   79.694830]  ? lock_is_held_type+0xe3/0x140
[   79.694864]  ? ww_mutex_lock+0x38/0xa0
[   79.694885]  ? __cond_resched+0x1c/0x30
[   79.694902]  ww_mutex_lock+0x38/0xa0
[   79.694925]  psb_gem_unpin+0x27/0x1a0 [gma500_gfx]
[   79.694964]  psb_gem_unpin+0x199/0x1a0 [gma500_gfx]
[   79.694996]  drm_gem_object_release_handle+0x50/0x60
[   79.695020]  ? drm_gem_object_handle_put_unlocked+0xf0/0xf0
[   79.695042]  idr_for_each+0x4b/0xb0
[   79.695066]  ? _raw_spin_unlock_irqrestore+0x30/0x60
[   79.695095]  drm_gem_release+0x1c/0x30
[   79.695118]  drm_file_free.part.0+0x1ea/0x260
[   79.695150]  drm_release+0x6a/0x120
[   79.695175]  __fput+0x9f/0x260
[   79.695203]  task_work_run+0x59/0xa0
[   79.695227]  do_exit+0x387/0xbe0
[   79.695250]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
[   79.695275]  ? lockdep_hardirqs_on+0x7d/0x100
[   79.695304]  do_group_exit+0x33/0xb0
[   79.695331]  __x64_sys_exit_group+0x14/0x20
[   79.695353]  do_syscall_64+0x58/0x80
[   79.695376]  ? up_read+0x17/0x20
[   79.695401]  ? lock_is_held_type+0xe3/0x140
[   79.695429]  ? asm_exc_page_fault+0x22/0x30
[   79.695450]  ? lockdep_hardirqs_on+0x7d/0x100
[   79.695473]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   79.695493] RIP: 0033:0x7ff1ccefe3f1
[   79.695516] Code: Unable to access opcode bytes at RIP 0x7ff1ccefe3c7.
[   79.695607] RSP: 002b:00007ffed4413378 EFLAGS: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48633/">CVE-2022-48633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48633">CVE-2022-48633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223489">SUSE bug 1223489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48634</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48634" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix BUG: sleeping function called from invalid context errors

gma_crtc_page_flip() was holding the event_lock spinlock while calling
crtc_funcs-&gt;mode_set_base() which takes ww_mutex.

The only reason to hold event_lock is to clear gma_crtc-&gt;page_flip_event
on mode_set_base() errors.

Instead unlock it after setting gma_crtc-&gt;page_flip_event and on
errors re-take the lock and clear gma_crtc-&gt;page_flip_event it
it is still set.

This fixes the following WARN/stacktrace:

[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870
[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell
[  512.123031] preempt_count: 1, expected: 0
[  512.123048] RCU nest depth: 0, expected: 0
[  512.123066] INFO: lockdep is turned off.
[  512.123080] irq event stamp: 0
[  512.123094] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123134] hardirqs last disabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123176] softirqs last  enabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123207] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123233] Preemption disabled at:
[  512.123241] [&lt;0000000000000000&gt;] 0x0
[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1
[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013
[  512.123323] Call Trace:
[  512.123346]  &lt;TASK&gt;
[  512.123370]  dump_stack_lvl+0x5b/0x77
[  512.123412]  __might_resched.cold+0xff/0x13a
[  512.123458]  ww_mutex_lock+0x1e/0xa0
[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]
[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]
[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]
[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0
[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.123936]  drm_ioctl_kernel+0xa1/0x150
[  512.123984]  drm_ioctl+0x21f/0x420
[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60
[  512.124104]  ? lock_release+0x1ef/0x2d0
[  512.124161]  __x64_sys_ioctl+0x8d/0xd0
[  512.124203]  do_syscall_64+0x58/0x80
[  512.124239]  ? do_syscall_64+0x67/0x80
[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0
[  512.124300]  ? do_syscall_64+0x67/0x80
[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80
[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  512.124411] RIP: 0033:0x7fcc4a70740f
[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f
[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009
[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034
[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0
[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0
[  512.124647]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48636</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup

Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup
pointer being NULL.

The pavgroup pointer is checked on the entrance of the function but
without the lcu-&gt;lock being held. Therefore there is a race window
between dasd_alias_get_start_dev() and _lcu_update() which sets
pavgroup to NULL with the lcu-&gt;lock held.

Fix by checking the pavgroup pointer with lcu-&gt;lock held.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48637</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: prevent skb UAF after handing over to PTP worker

When reading the timestamp is required bnxt_tx_int() hands
over the ownership of the completed skb to the PTP worker.
The skb should not be used afterwards, as the worker may
run before the rest of our code and free the skb, leading
to a use-after-free.

Since dev_kfree_skb_any() accepts NULL make the loss of
ownership more obvious and set skb to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48638</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: cgroup_get_from_id() must check the looked-up kn is a directory

cgroup has to be one kernfs dir, otherwise kernel panic is caused,
especially cgroup id is provide from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48639</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48639" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48639" ref_url="https://www.suse.com/security/cve/CVE-2022-48639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix possible refcount leak in tc_new_tfilter()

tfilter_put need to be called to put the refount got by tp-&gt;ops-&gt;get to
avoid possible refcount leak when chain-&gt;tmplt_ops != NULL and
chain-&gt;tmplt_ops != tp-&gt;ops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48639/">CVE-2022-48639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48639">CVE-2022-48639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223490">SUSE bug 1223490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48640</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48640" ref_url="https://www.suse.com/security/cve/CVE-2022-48640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix NULL deref in bond_rr_gen_slave_id

Fix a NULL dereference of the struct bonding.rr_tx_counter member because
if a bond is initially created with an initial mode != zero (Round Robin)
the memory required for the counter is never created and when the mode is
changed there is never any attempt to verify the memory is allocated upon
switching modes.

This causes the following Oops on an aarch64 machine:
    [  334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000
    [  334.694703] Mem abort info:
    [  334.697486]   ESR = 0x0000000096000004
    [  334.701234]   EC = 0x25: DABT (current EL), IL = 32 bits
    [  334.706536]   SET = 0, FnV = 0
    [  334.709579]   EA = 0, S1PTW = 0
    [  334.712719]   FSC = 0x04: level 0 translation fault
    [  334.717586] Data abort info:
    [  334.720454]   ISV = 0, ISS = 0x00000004
    [  334.724288]   CM = 0, WnR = 0
    [  334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000
    [  334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000
    [  334.740734] Internal error: Oops: 96000004 [#1] SMP
    [  334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon
    [  334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4
    [  334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021
    [  334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    [  334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]
    [  334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]
    [  334.807962] sp : ffff8000221733e0
    [  334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c
    [  334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000
    [  334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0
    [  334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014
    [  334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62
    [  334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000
    [  334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec
    [  334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742
    [  334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400
    [  334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0
    [  334.882532] Call trace:
    [  334.884967]  bond_rr_gen_slave_id+0x40/0x124 [bonding]
    [  334.890109]  bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]
    [  334.896033]  __bond_start_xmit+0x128/0x3a0 [bonding]
    [  334.901001]  bond_start_xmit+0x54/0xb0 [bonding]
    [  334.905622]  dev_hard_start_xmit+0xb4/0x220
    [  334.909798]  __dev_queue_xmit+0x1a0/0x720
    [  334.913799]  arp_xmit+0x3c/0xbc
    [  334.916932]  arp_send_dst+0x98/0xd0
    [  334.920410]  arp_solicit+0xe8/0x230
    [  334.923888]  neigh_probe+0x60/0xb0
    [  334.927279]  __neigh_event_send+0x3b0/0x470
    [  334.931453]  neigh_resolve_output+0x70/0x90
    [  334.935626]  ip_finish_output2+0x158/0x514
    [  334.939714]  __ip_finish_output+0xac/0x1a4
    [  334.943800]  ip_finish_output+0x40/0xfc
    [  334.947626]  ip_output+0xf8/0x1a4
    [  334.950931]  ip_send_skb+0x5c/0x100
    [  334.954410]  ip_push_pending_frames+0x3c/0x60
    [  334.958758]  raw_sendmsg+0x458/0x6d0
    [  334.962325]  inet_sendmsg+0x50/0x80
    [  334.965805]  sock_sendmsg+0x60/0x6c
    [  334.969286]  __sys_sendto+0xc8/0x134
    [  334.972853]  __arm64_sys_sendto+0x34/0x4c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48640/">CVE-2022-48640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48640">CVE-2022-48640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223499">SUSE bug 1223499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48642</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48642" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48642" ref_url="https://www.suse.com/security/cve/CVE-2022-48642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()

It seems to me that percpu memory for chain stats started leaking since
commit 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority to
hardware priority") when nft_chain_offload_priority() returned an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48642/">CVE-2022-48642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48642">CVE-2022-48642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223478">SUSE bug 1223478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48644</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48644" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48644" ref_url="https://www.suse.com/security/cve/CVE-2022-48644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: avoid disabling offload when it was never enabled

In an incredibly strange API design decision, qdisc-&gt;destroy() gets
called even if qdisc-&gt;init() never succeeded, not exclusively since
commit 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation"),
but apparently also earlier (in the case of qdisc_create_dflt()).

The taprio qdisc does not fully acknowledge this when it attempts full
offload, because it starts off with q-&gt;flags = TAPRIO_FLAGS_INVALID in
taprio_init(), then it replaces q-&gt;flags with TCA_TAPRIO_ATTR_FLAGS
parsed from netlink (in taprio_change(), tail called from taprio_init()).

But in taprio_destroy(), we call taprio_disable_offload(), and this
determines what to do based on FULL_OFFLOAD_IS_ENABLED(q-&gt;flags).

But looking at the implementation of FULL_OFFLOAD_IS_ENABLED()
(a bitwise check of bit 1 in q-&gt;flags), it is invalid to call this macro
on q-&gt;flags when it contains TAPRIO_FLAGS_INVALID, because that is set
to U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on
an invalid set of flags.

As a result, it is possible to crash the kernel if user space forces an
error between setting q-&gt;flags = TAPRIO_FLAGS_INVALID, and the calling
of taprio_enable_offload(). This is because drivers do not expect the
offload to be disabled when it was never enabled.

The error that we force here is to attach taprio as a non-root qdisc,
but instead as child of an mqprio root qdisc:

$ tc qdisc add dev swp0 root handle 1: \
	mqprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc qdisc replace dev swp0 parent 1:1 \
	taprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \
	sched-entry S 0x7f 990000 sched-entry S 0x80 100000 \
	flags 0x0 clockid CLOCK_TAI
Unable to handle kernel paging request at virtual address fffffffffffffff8
[fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 96000004 [#1] PREEMPT SMP
Call trace:
 taprio_dump+0x27c/0x310
 vsc9959_port_setup_tc+0x1f4/0x460
 felix_port_setup_tc+0x24/0x3c
 dsa_slave_setup_tc+0x54/0x27c
 taprio_disable_offload.isra.0+0x58/0xe0
 taprio_destroy+0x80/0x104
 qdisc_create+0x240/0x470
 tc_modify_qdisc+0x1fc/0x6b0
 rtnetlink_rcv_msg+0x12c/0x390
 netlink_rcv_skb+0x5c/0x130
 rtnetlink_rcv+0x1c/0x2c

Fix this by keeping track of the operations we made, and undo the
offload only if we actually did it.

I've added "bool offloaded" inside a 4 byte hole between "int clockid"
and "atomic64_t picos_per_byte". Now the first cache line looks like
below:

$ pahole -C taprio_sched net/sched/sch_taprio.o
struct taprio_sched {
        struct Qdisc * *           qdiscs;               /*     0     8 */
        struct Qdisc *             root;                 /*     8     8 */
        u32                        flags;                /*    16     4 */
        enum tk_offsets            tk_offset;            /*    20     4 */
        int                        clockid;              /*    24     4 */
        bool                       offloaded;            /*    28     1 */

        /* XXX 3 bytes hole, try to pack */

        atomic64_t                 picos_per_byte;       /*    32     0 */

        /* XXX 8 bytes hole, try to pack */

        spinlock_t                 current_entry_lock;   /*    40     0 */

        /* XXX 8 bytes hole, try to pack */

        struct sched_entry *       current_entry;        /*    48     8 */
        struct sched_gate_list *   oper_sched;           /*    56     8 */
        /* --- cacheline 1 boundary (64 bytes) --- */
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48644/">CVE-2022-48644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48644">CVE-2022-48644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223511">SUSE bug 1223511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48645</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48645" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48645" ref_url="https://www.suse.com/security/cve/CVE-2022-48645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: deny offload of tc-based TSN features on VF interfaces

TSN features on the ENETC (taprio, cbs, gate, police) are configured
through a mix of command BD ring messages and port registers:
enetc_port_rd(), enetc_port_wr().

Port registers are a region of the ENETC memory map which are only
accessible from the PCIe Physical Function. They are not accessible from
the Virtual Functions.

Moreover, attempting to access these registers crashes the kernel:

$ echo 1 &gt; /sys/bus/pci/devices/0000\:00\:00.0/sriov_numvfs
pci 0000:00:01.0: [1957:ef00] type 00 class 0x020001
fsl_enetc_vf 0000:00:01.0: Adding to iommu group 15
fsl_enetc_vf 0000:00:01.0: enabling device (0000 -&gt; 0002)
fsl_enetc_vf 0000:00:01.0 eno0vf0: renamed from eth0
$ tc qdisc replace dev eno0vf0 root taprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \
	sched-entry S 0x7f 900000 sched-entry S 0x80 100000 flags 0x2
Unable to handle kernel paging request at virtual address ffff800009551a08
Internal error: Oops: 96000007 [#1] PREEMPT SMP
pc : enetc_setup_tc_taprio+0x170/0x47c
lr : enetc_setup_tc_taprio+0x16c/0x47c
Call trace:
 enetc_setup_tc_taprio+0x170/0x47c
 enetc_setup_tc+0x38/0x2dc
 taprio_change+0x43c/0x970
 taprio_init+0x188/0x1e0
 qdisc_create+0x114/0x470
 tc_modify_qdisc+0x1fc/0x6c0
 rtnetlink_rcv_msg+0x12c/0x390

Split enetc_setup_tc() into separate functions for the PF and for the
VF drivers. Also remove enetc_qos.o from being included into
enetc-vf.ko, since it serves absolutely no purpose there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48645/">CVE-2022-48645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48645">CVE-2022-48645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223508">SUSE bug 1223508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48646</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48646" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48646" ref_url="https://www.suse.com/security/cve/CVE-2022-48646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc/siena: fix null pointer dereference in efx_hard_start_xmit

Like in previous patch for sfc, prevent potential (but unlikely) NULL
pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48646/">CVE-2022-48646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48646">CVE-2022-48646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223502">SUSE bug 1223502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48647</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix TX channel offset when using legacy interrupts

In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but
that's not correct if efx_sepparate_tx_channels is false. In that case,
the offset is 0 because the tx queues are in the single existing channel
at index 0, together with the rx queue.

Without this fix, as soon as you try to send any traffic, it tries to
get the tx queues from an uninitialized channel getting these errors:
  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48648</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix null pointer dereference in efx_hard_start_xmit

Trying to get the channel from the tx_queue variable here is wrong
because we can only be here if tx_queue is NULL, so we shouldn't
dereference it. As the above comment in the code says, this is very
unlikely to happen, but it's wrong anyway so let's fix it.

I hit this issue because of a different bug that caused tx_queue to be
NULL. If that happens, this is the error message that we get here:
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48650</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48650" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()

Commit 8f394da36a36 ("scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG")
made the __qlt_24xx_handle_abts() function return early if
tcm_qla2xxx_find_cmd_by_tag() didn't find a command, but it missed to clean
up the allocated memory for the management command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Fix out-of-bound bugs caused by unset skb-&gt;mac_header

If an AF_PACKET socket is used to send packets through ipvlan and the
default xmit function of the AF_PACKET socket is changed from
dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option
name of PACKET_QDISC_BYPASS, the skb-&gt;mac_header may not be reset and
remains as the initial value of 65535, this may trigger slab-out-of-bounds
bugs as following:

=================================================================
UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6
ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33
all Trace:
print_address_description.constprop.0+0x1d/0x160
print_report.cold+0x4f/0x112
kasan_report+0xa3/0x130
ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
ipvlan_start_xmit+0x29/0xa0 [ipvlan]
__dev_direct_xmit+0x2e2/0x380
packet_direct_xmit+0x22/0x60
packet_snd+0x7c9/0xc40
sock_sendmsg+0x9a/0xa0
__sys_sendto+0x18a/0x230
__x64_sys_sendto+0x74/0x90
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The root cause is:
  1. packet_snd() only reset skb-&gt;mac_header when sock-&gt;type is SOCK_RAW
     and skb-&gt;protocol is not specified as in packet_parse_headers()

  2. packet_direct_xmit() doesn't reset skb-&gt;mac_header as dev_queue_xmit()

In this case, skb-&gt;mac_header is 65535 when ipvlan_xmit_mode_l2() is
called. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which
use "skb-&gt;head + skb-&gt;mac_header", out-of-bound access occurs.

This patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()
and reset mac header in multicast to solve this out-of-bound bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223514">SUSE bug 1223514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48652" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix crash by keep old cfg when update TCs more than queues

There are problems if allocated queues less than Traffic Classes.

Commit a632b2a4c920 ("ice: ethtool: Prohibit improper channel config
for DCB") already disallow setting less queues than TCs.

Another case is if we first set less queues, and later update more TCs
config due to LLDP, ice_vsi_cfg_tc() will failed but left dirty
num_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.

[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.
[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!
[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0
[   95.969621] general protection fault: 0000 [#1] SMP NOPTI
[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1
[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021
[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60
[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 &lt;8b&gt; 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c
[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206
[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0
[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200
[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000
[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100
[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460
[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000
[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0
[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   95.971530] PKRU: 55555554
[   95.971573] Call Trace:
[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]
[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]
[   95.971774]  ice_vsi_open+0x25/0x120 [ice]
[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]
[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]
[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]
[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]
[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]
[   95.972220]  dcbnl_ieee_set+0x89/0x230
[   95.972279]  ? dcbnl_ieee_del+0x150/0x150
[   95.972341]  dcb_doit+0x124/0x1b0
[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0
[   95.972457]  ? dcb_doit+0x14d/0x1b0
[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280
[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100
[   95.972661]  netlink_rcv_skb+0xcf/0xf0
[   95.972720]  netlink_unicast+0x16d/0x220
[   95.972781]  netlink_sendmsg+0x2ba/0x3a0
[   95.975891]  sock_sendmsg+0x4c/0x50
[   95.979032]  ___sys_sendmsg+0x2e4/0x300
[   95.982147]  ? kmem_cache_alloc+0x13e/0x190
[   95.985242]  ? __wake_up_common_lock+0x79/0x90
[   95.988338]  ? __check_object_size+0xac/0x1b0
[   95.991440]  ? _copy_to_user+0x22/0x30
[   95.994539]  ? move_addr_to_user+0xbb/0xd0
[   95.997619]  ? __sys_sendmsg+0x53/0x80
[   96.000664]  __sys_sendmsg+0x53/0x80
[   96.003747]  do_syscall_64+0x5b/0x1d0
[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca

Only update num_txq/rxq when passed check, and restore tc_cfg if setup
queue map failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48653</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Don't double unplug aux on peer initiated reset

In the IDC callback that is accessed when the aux drivers request a reset,
the function to unplug the aux devices is called.  This function is also
called in the ice_prepare_for_reset function. This double call is causing
a "scheduling while atomic" BUG.

[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003

[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003

[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003

[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424

[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002
[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe
 r ttm
[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse
[  662.815557] Preemption disabled at:
[  662.815558] [&lt;0000000000000000&gt;] 0x0
[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2
[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021
[  662.815568] Call Trace:
[  662.815572]  &lt;IRQ&gt;
[  662.815574]  dump_stack_lvl+0x33/0x42
[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a
[  662.815588]  __schedule+0x798/0x990
[  662.815595]  schedule+0x44/0xc0
[  662.815597]  schedule_preempt_disabled+0x14/0x20
[  662.815600]  __mutex_lock.isra.11+0x46c/0x490
[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]
[  662.815633]  device_del+0x37/0x3d0
[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]
[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]
[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]
[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0
[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]
[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]
[  662.815756]  __handle_irq_event_percpu+0x4c/0x180
[  662.815762]  handle_irq_event_percpu+0xf/0x40
[  662.815764]  handle_irq_event+0x34/0x60
[  662.815766]  handle_edge_irq+0x9a/0x1c0
[  662.815770]  __common_interrupt+0x62/0x100
[  662.815774]  common_interrupt+0xb4/0xd0
[  662.815779]  &lt;/IRQ&gt;
[  662.815780]  &lt;TASK&gt;
[  662.815780]  asm_common_interrupt+0x1e/0x40
[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380
[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 &lt;0f&gt; 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49
[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202
[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f
[  662.815795] RDX: 0000009a52da2d08 R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48654</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()

nf_osf_find() incorrectly returns true on mismatch, this leads to
copying uninitialized memory area in nft_osf which can be used to leak
stale kernel stack data to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Harden accesses to the reset domains

Accessing reset domains descriptors by the index upon the SCMI drivers
requests through the SCMI reset operations interface can potentially
lead to out-of-bound violations if the SCMI driver misbehave.

Add an internal consistency check before any such domains descriptors
accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48656</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()

We should call of_node_put() for the reference returned by
of_parse_phandle() in fail path or when it is not used anymore.
Here we only need to move the of_node_put() before the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48657</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: topology: fix possible overflow in amu_fie_setup()

cpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,
while freq_inv_set_max_ratio() gets passed this frequency in Hz as 'u64'.
Multiplying max frequency by 1000 can potentially result in overflow --
multiplying by 1000ULL instead should avoid that...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48658</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48658" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48658" ref_url="https://www.suse.com/security/cve/CVE-2022-48658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.

Commit 5a836bf6b09f ("mm: slub: move flush_cpu_slab() invocations
__free_slab() invocations out of IRQ context") moved all flush_cpu_slab()
invocations to the global workqueue to avoid a problem related
with deactivate_slab()/__free_slab() being called from an IRQ context
on PREEMPT_RT kernels.

When the flush_all_cpu_locked() function is called from a task context
it may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up
flushing the global workqueue, this will cause a dependency issue.

 workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]
   is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab
 WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637
   check_flush_dependency+0x10a/0x120
 Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core]
 RIP: 0010:check_flush_dependency+0x10a/0x120[  453.262125] Call Trace:
 __flush_work.isra.0+0xbf/0x220
 ? __queue_work+0x1dc/0x420
 flush_all_cpus_locked+0xfb/0x120
 __kmem_cache_shutdown+0x2b/0x320
 kmem_cache_destroy+0x49/0x100
 bioset_exit+0x143/0x190
 blk_release_queue+0xb9/0x100
 kobject_cleanup+0x37/0x130
 nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc]
 nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]

Fix this bug by creating a workqueue for the flush operation with
the WQ_MEM_RECLAIM bit set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48658/">CVE-2022-48658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48658">CVE-2022-48658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223496">SUSE bug 1223496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48659</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48659" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48659" ref_url="https://www.suse.com/security/cve/CVE-2022-48659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: fix to return errno if kmalloc() fails

In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to
out-of-memory, if it fails, return errno correctly rather than
triggering panic via BUG_ON();

kernel BUG at mm/slub.c:5893!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP

Call trace:
 sysfs_slab_add+0x258/0x260 mm/slub.c:5973
 __kmem_cache_create+0x60/0x118 mm/slub.c:4899
 create_cache mm/slab_common.c:229 [inline]
 kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335
 kmem_cache_create+0x1c/0x28 mm/slab_common.c:390
 f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]
 f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808
 f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149
 mount_bdev+0x1b8/0x210 fs/super.c:1400
 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512
 legacy_get_tree+0x30/0x74 fs/fs_context.c:610
 vfs_get_tree+0x40/0x140 fs/super.c:1530
 do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040
 path_mount+0x358/0x914 fs/namespace.c:3370
 do_mount fs/namespace.c:3383 [inline]
 __do_sys_mount fs/namespace.c:3591 [inline]
 __se_sys_mount fs/namespace.c:3568 [inline]
 __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48659/">CVE-2022-48659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48659">CVE-2022-48659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223498">SUSE bug 1223498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully

When running gpio test on nxp-ls1028 platform with below command
gpiomon --num-events=3 --rising-edge gpiochip1 25
There will be a warning trace as below:
Call trace:
free_irq+0x204/0x360
lineevent_free+0x64/0x70
gpio_ioctl+0x598/0x6a0
__arm64_sys_ioctl+0xb4/0x100
invoke_syscall+0x5c/0x130
......
el0t_64_sync+0x1a0/0x1a4
The reason of this issue is that calling request_threaded_irq()
function failed, and then lineevent_free() is invoked to release
the resource. Since the lineevent_state::irq was already set, so
the subsequent invocation of free_irq() would trigger the above
warning call trace. To fix this issue, set the lineevent_state::irq
after the IRQ register successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48662</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Really move i915_gem_context.link under ref protection

i915_perf assumes that it can use the i915_gem_context reference to
protect its i915-&gt;gem.contexts.list iteration. However, this requires
that we do not remove the context from the list until after we drop the
final reference and release the struct. If, as currently, we remove the
context from the list during context_close(), the link.next pointer may
be poisoned while we are holding the context reference and cause a GPF:

[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff
[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP
[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180
[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017
[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]
[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 &lt;49&gt; 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff
[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202
[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000
[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68
[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc
[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860
[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc
[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000
[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0
[ 4070.575029] Call Trace:
[ 4070.575033]  &lt;TASK&gt;
[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]
[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]
[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]
[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40
[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575290]  drm_ioctl_kernel+0x85/0x110
[ 4070.575296]  ? update_load_avg+0x5f/0x5e0
[ 4070.575302]  drm_ioctl+0x1d3/0x370
[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]
[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0
[ 4070.575451]  ? __do_softirq+0xaa/0x1d2
[ 4070.575456]  do_syscall_64+0x35/0x80
[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 4070.575467] RIP: 0033:0x7f1ed5c10397
[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48
[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397
[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006
[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005
[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a
[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0
[ 4070.575505]  &lt;/TASK&gt;
[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223521">SUSE bug 1223521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48663</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: mockup: fix NULL pointer dereference when removing debugfs

We now remove the device's debugfs entries when unbinding the driver.
This now causes a NULL-pointer dereference on module exit because the
platform devices are unregistered *after* the global debugfs directory
has been recursively removed. Fix it by unregistering the devices first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48664</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48664" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix hang during unmount when stopping a space reclaim worker

Often when running generic/562 from fstests we can hang during unmount,
resulting in a trace like this:

  Sep 07 11:52:00 debian9 unknown: run fstests generic/562 at 2022-09-07 11:52:00
  Sep 07 11:55:32 debian9 kernel: INFO: task umount:49438 blocked for more than 120 seconds.
  Sep 07 11:55:32 debian9 kernel:       Not tainted 6.0.0-rc2-btrfs-next-122 #1
  Sep 07 11:55:32 debian9 kernel: "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  Sep 07 11:55:32 debian9 kernel: task:umount          state:D stack:    0 pid:49438 ppid: 25683 flags:0x00004000
  Sep 07 11:55:32 debian9 kernel: Call Trace:
  Sep 07 11:55:32 debian9 kernel:  &lt;TASK&gt;
  Sep 07 11:55:32 debian9 kernel:  __schedule+0x3c8/0xec0
  Sep 07 11:55:32 debian9 kernel:  ? rcu_read_lock_sched_held+0x12/0x70
  Sep 07 11:55:32 debian9 kernel:  schedule+0x5d/0xf0
  Sep 07 11:55:32 debian9 kernel:  schedule_timeout+0xf1/0x130
  Sep 07 11:55:32 debian9 kernel:  ? lock_release+0x224/0x4a0
  Sep 07 11:55:32 debian9 kernel:  ? lock_acquired+0x1a0/0x420
  Sep 07 11:55:32 debian9 kernel:  ? trace_hardirqs_on+0x2c/0xd0
  Sep 07 11:55:32 debian9 kernel:  __wait_for_common+0xac/0x200
  Sep 07 11:55:32 debian9 kernel:  ? usleep_range_state+0xb0/0xb0
  Sep 07 11:55:32 debian9 kernel:  __flush_work+0x26d/0x530
  Sep 07 11:55:32 debian9 kernel:  ? flush_workqueue_prep_pwqs+0x140/0x140
  Sep 07 11:55:32 debian9 kernel:  ? trace_clock_local+0xc/0x30
  Sep 07 11:55:32 debian9 kernel:  __cancel_work_timer+0x11f/0x1b0
  Sep 07 11:55:32 debian9 kernel:  ? close_ctree+0x12b/0x5b3 [btrfs]
  Sep 07 11:55:32 debian9 kernel:  ? __trace_bputs+0x10b/0x170
  Sep 07 11:55:32 debian9 kernel:  close_ctree+0x152/0x5b3 [btrfs]
  Sep 07 11:55:32 debian9 kernel:  ? evict_inodes+0x166/0x1c0
  Sep 07 11:55:32 debian9 kernel:  generic_shutdown_super+0x71/0x120
  Sep 07 11:55:32 debian9 kernel:  kill_anon_super+0x14/0x30
  Sep 07 11:55:32 debian9 kernel:  btrfs_kill_super+0x12/0x20 [btrfs]
  Sep 07 11:55:32 debian9 kernel:  deactivate_locked_super+0x2e/0xa0
  Sep 07 11:55:32 debian9 kernel:  cleanup_mnt+0x100/0x160
  Sep 07 11:55:32 debian9 kernel:  task_work_run+0x59/0xa0
  Sep 07 11:55:32 debian9 kernel:  exit_to_user_mode_prepare+0x1a6/0x1b0
  Sep 07 11:55:32 debian9 kernel:  syscall_exit_to_user_mode+0x16/0x40
  Sep 07 11:55:32 debian9 kernel:  do_syscall_64+0x48/0x90
  Sep 07 11:55:32 debian9 kernel:  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  Sep 07 11:55:32 debian9 kernel: RIP: 0033:0x7fcde59a57a7
  Sep 07 11:55:32 debian9 kernel: RSP: 002b:00007ffe914217c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
  Sep 07 11:55:32 debian9 kernel: RAX: 0000000000000000 RBX: 00007fcde5ae8264 RCX: 00007fcde59a57a7
  Sep 07 11:55:32 debian9 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055b57556cdd0
  Sep 07 11:55:32 debian9 kernel: RBP: 000055b57556cba0 R08: 0000000000000000 R09: 00007ffe91420570
  Sep 07 11:55:32 debian9 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  Sep 07 11:55:32 debian9 kernel: R13: 000055b57556cdd0 R14: 000055b57556ccb8 R15: 0000000000000000
  Sep 07 11:55:32 debian9 kernel:  &lt;/TASK&gt;

What happens is the following:

1) The cleaner kthread tries to start a transaction to delete an unused
   block group, but the metadata reservation can not be satisfied right
   away, so a reservation ticket is created and it starts the async
   metadata reclaim task (fs_info-&gt;async_reclaim_work);

2) Writeback for all the filler inodes with an i_size of 2K starts
   (generic/562 creates a lot of 2K files with the goal of filling
   metadata space). We try to create an inline extent for them, but we
   fail when trying to insert the inline extent with -ENOSPC (at
   cow_file_range_inline()) - since this is not critical, we fallback
   to non-inline mode (back to cow_file_range()), reserve extents
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in insert range

insert range doesn't discard the affected cached region
so can risk temporarily corrupting file data.

Also includes some minor cleanup (avoiding rereading
inode size repeatedly unnecessarily) to make it clearer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48668</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in collapse range

collapse range doesn't discard the affected cached region
so can risk temporarily corrupting the file data. This
fixes xfstest generic/031

I also decided to merge a minor cleanup to this into the same patch
(avoiding rereading inode size repeatedly unnecessarily) to make it
clearer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48669</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48669" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Fix potential memleak in papr_get_attr()

`buf` is allocated in papr_get_attr(), and krealloc() of `buf`
could fail. We need to free the original `buf` in the case of failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223756">SUSE bug 1223756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48671</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()

syzbot is hitting percpu_rwsem_assert_held(&amp;cpu_hotplug_lock) warning at
cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix
threadgroup_rwsem &lt;-&gt; cpus_read_lock() deadlock") missed that
cpuset_attach() is also called from cgroup_attach_task_all().
Add cpus_read_lock() like what cgroup_procs_write_start() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48672</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: fdt: fix off-by-one error in unflatten_dt_nodes()

Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree")
forgot to fix up the depth check in the loop body in unflatten_dt_nodes()
which makes it possible to overflow the nps[] buffer...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48673</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix possible access to freed memory in link clear

After modifying the QP to the Error state, all RX WR would be completed
with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not
wait for it is done, but destroy the QP and free the link group directly.
So there is a risk that accessing the freed memory in tasklet context.

Here is a crash example:

 BUG: unable to handle page fault for address: ffffffff8f220860
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060
 Oops: 0002 [#1] SMP PTI
 CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23
 Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018
 RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0
 Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e &lt;48&gt; 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32
 RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086
 RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000
 RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00
 RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b
 R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010
 R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  _raw_spin_lock_irqsave+0x30/0x40
  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]
  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]
  tasklet_action_common.isra.21+0x66/0x100
  __do_softirq+0xd5/0x29c
  asm_call_irq_on_stack+0x12/0x20
  &lt;/IRQ&gt;
  do_softirq_own_stack+0x37/0x40
  irq_exit_rcu+0x9d/0xa0
  sysvec_call_function_single+0x34/0x80
  asm_sysvec_call_function_single+0x12/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223940">SUSE bug 1223940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48674</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48674" ref_url="https://www.suse.com/security/cve/CVE-2022-48674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix pcluster use-after-free on UP platforms

During stress testing with CONFIG_SMP disabled, KASAN reports as below:

==================================================================
BUG: KASAN: use-after-free in __mutex_lock+0xe5/0xc30
Read of size 8 at addr ffff8881094223f8 by task stress/7789

CPU: 0 PID: 7789 Comm: stress Not tainted 6.0.0-rc1-00002-g0d53d2e882f9 #3
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
Call Trace:
 &lt;TASK&gt;
..
 __mutex_lock+0xe5/0xc30
..
 z_erofs_do_read_page+0x8ce/0x1560
..
 z_erofs_readahead+0x31c/0x580
..
Freed by task 7787
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x20/0x30
 kasan_set_free_info+0x20/0x40
 __kasan_slab_free+0x10c/0x190
 kmem_cache_free+0xed/0x380
 rcu_core+0x3d5/0xc90
 __do_softirq+0x12d/0x389

Last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x97/0xb0
 call_rcu+0x3d/0x3f0
 erofs_shrink_workstation+0x11f/0x210
 erofs_shrink_scan+0xdc/0x170
 shrink_slab.constprop.0+0x296/0x530
 drop_slab+0x1c/0x70
 drop_caches_sysctl_handler+0x70/0x80
 proc_sys_call_handler+0x20a/0x2f0
 vfs_write+0x555/0x6c0
 ksys_write+0xbe/0x160
 do_syscall_64+0x3b/0x90

The root cause is that erofs_workgroup_unfreeze() doesn't reset to
orig_val thus it causes a race that the pcluster reuses unexpectedly
before freeing.

Since UP platforms are quite rare now, such path becomes unnecessary.
Let's drop such specific-designed path directly instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48674/">CVE-2022-48674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48674">CVE-2022-48674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223942">SUSE bug 1223942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48675</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48675" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix a nested dead lock as part of ODP flow

Fix a nested dead lock as part of ODP flow by using mmput_async().

From the below call trace [1] can see that calling mmput() once we have
the umem_odp-&gt;umem_mutex locked as required by
ib_umem_odp_map_dma_and_lock() might trigger in the same task the
exit_mmap()-&gt;__mmu_notifier_release()-&gt;mlx5_ib_invalidate_range() which
may dead lock when trying to lock the same mutex.

Moving to use mmput_async() will solve the problem as the above
exit_mmap() flow will be called in other task and will be executed once
the lock will be available.

[1]
[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:
2 flags:0x00004000
[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]
[64843.077719] Call Trace:
[64843.077722]  &lt;TASK&gt;
[64843.077724]  __schedule+0x23d/0x590
[64843.077729]  schedule+0x4e/0xb0
[64843.077735]  schedule_preempt_disabled+0xe/0x10
[64843.077740]  __mutex_lock.constprop.0+0x263/0x490
[64843.077747]  __mutex_lock_slowpath+0x13/0x20
[64843.077752]  mutex_lock+0x34/0x40
[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]
[64843.077808]  __mmu_notifier_release+0x1a4/0x200
[64843.077816]  exit_mmap+0x1bc/0x200
[64843.077822]  ? walk_page_range+0x9c/0x120
[64843.077828]  ? __cond_resched+0x1a/0x50
[64843.077833]  ? mutex_lock+0x13/0x40
[64843.077839]  ? uprobe_clear_state+0xac/0x120
[64843.077860]  mmput+0x5f/0x140
[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]
[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]
[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]
[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560
[mlx5_ib]
[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]
[64843.078051]  process_one_work+0x22b/0x3d0
[64843.078059]  worker_thread+0x53/0x410
[64843.078065]  ? process_one_work+0x3d0/0x3d0
[64843.078073]  kthread+0x12a/0x150
[64843.078079]  ? set_kthread_struct+0x50/0x50
[64843.078085]  ret_from_fork+0x22/0x30
[64843.078093]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48686</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix UAF when detecting digest errors

We should also bail from the io_work loop when we set rd_enabled to true,
so we don't attempt to read data from the socket when the TCP stream is
already out-of-sync or corrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226337">SUSE bug 1226337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48687</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48687" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix out-of-bounds read when setting HMAC data.

The SRv6 layer allows defining HMAC data that can later be used to sign IPv6
Segment Routing Headers. This configuration is realised via netlink through
four attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and
SEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual
length of the SECRET attribute, it is possible to provide invalid combinations
(e.g., secret = "", secretlen = 64). This case is not checked in the code and
with an appropriately crafted netlink message, an out-of-bounds read of up
to 64 bytes (max secret length) can occur past the skb end pointer and into
skb_shared_info:

Breakpoint 1, seg6_genl_sethmac (skb=&lt;optimized out&gt;, info=&lt;optimized out&gt;) at net/ipv6/seg6.c:208
208		memcpy(hinfo-&gt;secret, secret, slen);
(gdb) bt
 #0  seg6_genl_sethmac (skb=&lt;optimized out&gt;, info=&lt;optimized out&gt;) at net/ipv6/seg6.c:208
 #1  0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600,
    extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 &lt;init_net&gt;, family=&lt;optimized out&gt;,
    family=&lt;optimized out&gt;) at net/netlink/genetlink.c:731
 #2  0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00,
    family=0xffffffff82fef6c0 &lt;seg6_genl_family&gt;) at net/netlink/genetlink.c:775
 #3  genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792
 #4  0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 &lt;genl_rcv_msg&gt;)
    at net/netlink/af_netlink.c:2501
 #5  0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803
 #6  0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000)
    at net/netlink/af_netlink.c:1319
 #7  netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=&lt;optimized out&gt;)
    at net/netlink/af_netlink.c:1345
 #8  0xffffffff81dff9a4 in netlink_sendmsg (sock=&lt;optimized out&gt;, msg=0xffffc90000ba7e48, len=&lt;optimized out&gt;) at net/netlink/af_netlink.c:1921
...
(gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)-&gt;head + ((struct sk_buff *)0xffff88800b1f9f00)-&gt;end
$1 = 0xffff88800b1b76c0
(gdb) p/x secret
$2 = 0xffff88800b1b76c0
(gdb) p slen
$3 = 64 '@'

The OOB data can then be read back from userspace by dumping HMAC state. This
commit fixes this by ensuring SECRETLEN cannot exceed the actual length of
SECRET.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224043">SUSE bug 1224043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48688</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix kernel crash during module removal

The driver incorrectly frees client instance and subsequent
i40e module removal leads to kernel crash.

Reproducer:
1. Do ethtool offline test followed immediately by another one
host# ethtool -t eth0 offline; ethtool -t eth0 offline
2. Remove recursively irdma module that also removes i40e module
host# modprobe -r irdma

Result:
[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110
[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2
[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01
[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1
[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030
[ 8687.768755] #PF: supervisor read access in kernel mode
[ 8687.773895] #PF: error_code(0x0000) - not-present page
[ 8687.779034] PGD 0 P4D 0
[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2
[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019
[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]
[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb &lt;48&gt; 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b
[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202
[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000
[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000
[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000
[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0
[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008
[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000
[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0
[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 8687.905572] PKRU: 55555554
[ 8687.908286] Call Trace:
[ 8687.910737]  &lt;TASK&gt;
[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]
[ 8687.917040]  pci_device_remove+0x33/0xa0
[ 8687.920962]  device_release_driver_internal+0x1aa/0x230
[ 8687.926188]  driver_detach+0x44/0x90
[ 8687.929770]  bus_remove_driver+0x55/0xe0
[ 8687.933693]  pci_unregister_driver+0x2a/0xb0
[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]

Two offline tests cause IRDMA driver failure (ETIMEDOUT) and this
failure is indicated back to i40e_client_subtask() that calls
i40e_client_del_instance() to free client instance referenced
by pf-&gt;cinst and sets this pointer to NULL. During the module
removal i40e_remove() calls i40e_lan_del_device() that dereferences
pf-&gt;cinst that is NULL -&gt; crash.
Do not remove client instance when client open callbacks fails and
just clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs
to take care about this situation (when netdev is up and client
is NOT opened) in i40e_notify_client_of_netdev_close() and
calls client close callback only when __I40E_CLIENT_INSTANCE_OPENED
is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48689</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48689" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48689" ref_url="https://www.suse.com/security/cve/CVE-2022-48689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: TX zerocopy should not sense pfmemalloc status

We got a recent syzbot report [1] showing a possible misuse
of pfmemalloc page status in TCP zerocopy paths.

Indeed, for pages coming from user space or other layers,
using page_is_pfmemalloc() is moot, and possibly could give
false positives.

There has been attempts to make page_is_pfmemalloc() more robust,
but not using it in the first place in this context is probably better,
removing cpu cycles.

Note to stable teams :

You need to backport 84ce071e38a6 ("net: introduce
__skb_fill_page_desc_noacc") as a prereq.

Race is more probable after commit c07aea3ef4d4
("mm: add a signature in struct page") because page_is_pfmemalloc()
is now using low order bit from page-&gt;lru.next, which can change
more often than page-&gt;index.

Low order bit should never be set for lru.next (when used as an anchor
in LRU list), so KCSAN report is mostly a false positive.

Backporting to older kernel versions seems not necessary.

[1]
BUG: KCSAN: data-race in lru_add_fn / tcp_build_frag

write to 0xffffea0004a1d2c8 of 8 bytes by task 18600 on cpu 0:
__list_add include/linux/list.h:73 [inline]
list_add include/linux/list.h:88 [inline]
lruvec_add_folio include/linux/mm_inline.h:105 [inline]
lru_add_fn+0x440/0x520 mm/swap.c:228
folio_batch_move_lru+0x1e1/0x2a0 mm/swap.c:246
folio_batch_add_and_move mm/swap.c:263 [inline]
folio_add_lru+0xf1/0x140 mm/swap.c:490
filemap_add_folio+0xf8/0x150 mm/filemap.c:948
__filemap_get_folio+0x510/0x6d0 mm/filemap.c:1981
pagecache_get_page+0x26/0x190 mm/folio-compat.c:104
grab_cache_page_write_begin+0x2a/0x30 mm/folio-compat.c:116
ext4_da_write_begin+0x2dd/0x5f0 fs/ext4/inode.c:2988
generic_perform_write+0x1d4/0x3f0 mm/filemap.c:3738
ext4_buffered_write_iter+0x235/0x3e0 fs/ext4/file.c:270
ext4_file_write_iter+0x2e3/0x1210
call_write_iter include/linux/fs.h:2187 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x468/0x760 fs/read_write.c:578
ksys_write+0xe8/0x1a0 fs/read_write.c:631
__do_sys_write fs/read_write.c:643 [inline]
__se_sys_write fs/read_write.c:640 [inline]
__x64_sys_write+0x3e/0x50 fs/read_write.c:640
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

read to 0xffffea0004a1d2c8 of 8 bytes by task 18611 on cpu 1:
page_is_pfmemalloc include/linux/mm.h:1740 [inline]
__skb_fill_page_desc include/linux/skbuff.h:2422 [inline]
skb_fill_page_desc include/linux/skbuff.h:2443 [inline]
tcp_build_frag+0x613/0xb20 net/ipv4/tcp.c:1018
do_tcp_sendpages+0x3e8/0xaf0 net/ipv4/tcp.c:1075
tcp_sendpage_locked net/ipv4/tcp.c:1140 [inline]
tcp_sendpage+0x89/0xb0 net/ipv4/tcp.c:1150
inet_sendpage+0x7f/0xc0 net/ipv4/af_inet.c:833
kernel_sendpage+0x184/0x300 net/socket.c:3561
sock_sendpage+0x5a/0x70 net/socket.c:1054
pipe_to_sendpage+0x128/0x160 fs/splice.c:361
splice_from_pipe_feed fs/splice.c:415 [inline]
__splice_from_pipe+0x222/0x4d0 fs/splice.c:559
splice_from_pipe fs/splice.c:594 [inline]
generic_splice_sendpage+0x89/0xc0 fs/splice.c:743
do_splice_from fs/splice.c:764 [inline]
direct_splice_actor+0x80/0xa0 fs/splice.c:931
splice_direct_to_actor+0x305/0x620 fs/splice.c:886
do_splice_direct+0xfb/0x180 fs/splice.c:974
do_sendfile+0x3bf/0x910 fs/read_write.c:1249
__do_sys_sendfile64 fs/read_write.c:1317 [inline]
__se_sys_sendfile64 fs/read_write.c:1303 [inline]
__x64_sys_sendfile64+0x10c/0x150 fs/read_write.c:1303
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0x0000000000000000 -&gt; 0xffffea0004a1d288

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 18611 Comm: syz-executor.4 Not tainted 6.0.0-rc2-syzkaller-00248-ge022620b5d05-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48689/">CVE-2022-48689 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48689">CVE-2022-48689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223959">SUSE bug 1223959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48690</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48690" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48690" ref_url="https://www.suse.com/security/cve/CVE-2022-48690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix DMA mappings leak

Fix leak, when user changes ring parameters.
During reallocation of RX buffers, new DMA mappings are created for
those buffers. New buffers with different RX ring count should
substitute older ones, but those buffers were freed in ice_vsi_cfg_rxq
and reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused
leak of already mapped DMA.
Reallocate ZC with xdp_buf struct, when BPF program loads. Reallocate
back to rx_buf, when BPF program unloads.
If BPF program is loaded/unloaded and XSK pools are created, reallocate
RX queues accordingly in XDP_SETUP_XSK_POOL handler.

Steps for reproduction:
while :
do
	for ((i=0; i&lt;=8160; i=i+32))
	do
		ethtool -G enp130s0f0 rx $i tx $i
		sleep 0.5
		ethtool -g enp130s0f0
	done
done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48690/">CVE-2022-48690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48690">CVE-2022-48690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223960">SUSE bug 1223960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48691</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48691" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48691" ref_url="https://www.suse.com/security/cve/CVE-2022-48691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: clean up hook list when offload flags check fails

splice back the hook list so nft_chain_release_hook() has a chance to
release the hooks.

BUG: memory leak
unreferenced object 0xffff88810180b100 (size 96):
  comm "syz-executor133", pid 3619, jiffies 4294945714 (age 12.690s)
  hex dump (first 32 bytes):
    28 64 23 02 81 88 ff ff 28 64 23 02 81 88 ff ff  (d#.....(d#.....
    90 a8 aa 83 ff ff ff ff 00 00 b5 0f 81 88 ff ff  ................
  backtrace:
    [&lt;ffffffff83a8c59b&gt;] kmalloc include/linux/slab.h:600 [inline]
    [&lt;ffffffff83a8c59b&gt;] nft_netdev_hook_alloc+0x3b/0xc0 net/netfilter/nf_tables_api.c:1901
    [&lt;ffffffff83a9239a&gt;] nft_chain_parse_netdev net/netfilter/nf_tables_api.c:1998 [inline]
    [&lt;ffffffff83a9239a&gt;] nft_chain_parse_hook+0x33a/0x530 net/netfilter/nf_tables_api.c:2073
    [&lt;ffffffff83a9b14b&gt;] nf_tables_addchain.constprop.0+0x10b/0x950 net/netfilter/nf_tables_api.c:2218
    [&lt;ffffffff83a9c41b&gt;] nf_tables_newchain+0xa8b/0xc60 net/netfilter/nf_tables_api.c:2593
    [&lt;ffffffff83a3d6a6&gt;] nfnetlink_rcv_batch+0xa46/0xd20 net/netfilter/nfnetlink.c:517
    [&lt;ffffffff83a3db79&gt;] nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:638 [inline]
    [&lt;ffffffff83a3db79&gt;] nfnetlink_rcv+0x1f9/0x220 net/netfilter/nfnetlink.c:656
    [&lt;ffffffff83a13b17&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
    [&lt;ffffffff83a13b17&gt;] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345
    [&lt;ffffffff83a13fd6&gt;] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921
    [&lt;ffffffff83865ab6&gt;] sock_sendmsg_nosec net/socket.c:714 [inline]
    [&lt;ffffffff83865ab6&gt;] sock_sendmsg+0x56/0x80 net/socket.c:734
    [&lt;ffffffff8386601c&gt;] ____sys_sendmsg+0x36c/0x390 net/socket.c:2482
    [&lt;ffffffff8386a918&gt;] ___sys_sendmsg+0xa8/0x110 net/socket.c:2536
    [&lt;ffffffff8386aaa8&gt;] __sys_sendmsg+0x88/0x100 net/socket.c:2565
    [&lt;ffffffff845e5955&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845e5955&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84800087&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48691/">CVE-2022-48691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48691">CVE-2022-48691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223961">SUSE bug 1223961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48692" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Set scmnd-&gt;result only when scmnd is not NULL

This change fixes the following kernel NULL pointer dereference
which is reproduced by blktests srp/007 occasionally.

BUG: kernel NULL pointer dereference, address: 0000000000000170
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014
Workqueue:  0x0 (kblockd)
RIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]
Code: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 &lt;41&gt; 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9
RSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282
RAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000
RDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff
RBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001
R10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000
R13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
 __ib_process_cq+0xb7/0x280 [ib_core]
 ib_poll_handler+0x2b/0x130 [ib_core]
 irq_poll_softirq+0x93/0x150
 __do_softirq+0xee/0x4b8
 irq_exit_rcu+0xf7/0x130
 sysvec_apic_timer_interrupt+0x8e/0xc0
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48693" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs

In brcmstb_pm_probe(), there are two kinds of leak bugs:

(1) we need to add of_node_put() when for_each__matching_node() breaks
(2) we need to add iounmap() for each iomap in fail path
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48694</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48694" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix drain SQ hang with no completion

SW generated completions for outstanding WRs posted on SQ
after QP is in error target the wrong CQ. This causes the
ib_drain_sq to hang with no completion.

Fix this to generate completions on the right CQ.

[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.
[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1
[  863.986588] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000
[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]
[  864.014056] Call Trace:
[  864.017575]  __schedule+0x206/0x580
[  864.022296]  schedule+0x43/0xa0
[  864.026736]  schedule_timeout+0x115/0x150
[  864.032185]  __wait_for_common+0x93/0x1d0
[  864.037717]  ? usleep_range_state+0x90/0x90
[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]
[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]
[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]
[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]
[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]
[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]
[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]
[  864.088718]  process_one_work+0x1e8/0x3c0
[  864.094170]  worker_thread+0x50/0x3b0
[  864.099109]  ? rescuer_thread+0x370/0x370
[  864.104473]  kthread+0x149/0x170
[  864.109022]  ? set_kthread_struct+0x40/0x40
[  864.114713]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during
controller reset:

refcount_t: underflow; use-after-free.
WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48697</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48697" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a use-after-free

Fix the following use-after-free complaint triggered by blktests nvme/004:

BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350
Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460
Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]
Call Trace:
 show_stack+0x52/0x58
 dump_stack_lvl+0x49/0x5e
 print_report.cold+0x36/0x1e2
 kasan_report+0xb9/0xf0
 __asan_load4+0x6b/0x80
 blk_mq_complete_request_remote+0xac/0x350
 nvme_loop_queue_response+0x1df/0x275 [nvme_loop]
 __nvmet_req_complete+0x132/0x4f0 [nvmet]
 nvmet_req_complete+0x15/0x40 [nvmet]
 nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]
 nvme_loop_execute_work+0x20/0x30 [nvme_loop]
 process_one_work+0x56e/0xa70
 worker_thread+0x2d1/0x640
 kthread+0x183/0x1c0
 ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48698" ref_url="https://www.suse.com/security/cve/CVE-2022-48698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix memory leak when using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  Fix this up by properly
calling dput().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48698/">CVE-2022-48698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48698">CVE-2022-48698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223956">SUSE bug 1223956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48699</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/debug: fix dentry leak in update_sched_domain_debugfs

Kuyo reports that the pattern of using debugfs_remove(debugfs_lookup())
leaks a dentry and with a hotplug stress test, the machine eventually
runs out of memory.

Fix this up by using the newly created debugfs_lookup_and_remove() call
instead which properly handles the dentry reference counting logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48700</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48701</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()

There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.

Fix this by checking the number of interfaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48702</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()

The voice allocator sometimes begins allocating from near the end of the
array and then wraps around, however snd_emu10k1_pcm_channel_alloc()
accesses the newly allocated voices as if it never wrapped around.

This results in out of bounds access if the first voice has a high enough
index so that first_voice + requested_voice_count &gt; NUM_G (64).
The more voices are requested, the more likely it is for this to occur.

This was initially discovered using PipeWire, however it can be reproduced
by calling aplay multiple times with 16 channels:
aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero

UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40
index 65 is out of range for type 'snd_emu10k1_voice [64]'
CPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7
Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
ubsan_epilogue+0x9/0x3f
__ubsan_handle_out_of_bounds.cold+0x44/0x49
snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]
snd_pcm_hw_params+0x29f/0x600 [snd_pcm]
snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]
? exit_to_user_mode_prepare+0x35/0x170
? do_syscall_64+0x69/0x90
? syscall_exit_to_user_mode+0x26/0x50
? do_syscall_64+0x69/0x90
? exit_to_user_mode_prepare+0x35/0x170
snd_pcm_ioctl+0x27/0x40 [snd_pcm]
__x64_sys_ioctl+0x95/0xd0
do_syscall_64+0x5c/0x90
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48703</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR

In some case, the GDDV returns a package with a buffer which has
zero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).

Then the data_vault_read() got NULL point dereference problem when
accessing the 0x10 value in data_vault.

[   71.024560] BUG: kernel NULL pointer dereference, address:
0000000000000010

This patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or
NULL value in data_vault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48704</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48704" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: add a force flush to delay work when radeon

Although radeon card fence and wait for gpu to finish processing current batch rings,
there is still a corner case that radeon lockup work queue may not be fully flushed,
and meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to
put device in D3hot state.
Per PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.
&gt; Configuration and Message requests are the only TLPs accepted by a Function in
&gt; the D3hot state. All other received Requests must be handled as Unsupported Requests,
&gt; and all received Completions may optionally be handled as Unexpected Completions.
This issue will happen in following logs:
Unable to handle kernel paging request at virtual address 00008800e0008010
CPU 0 kworker/0:3(131): Oops 0
pc = [&lt;ffffffff811bea5c&gt;]  ra = [&lt;ffffffff81240844&gt;]  ps = 0000 Tainted: G        W
pc is at si_gpu_check_soft_reset+0x3c/0x240
ra is at si_dma_is_lockup+0x34/0xd0
v0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000
t2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258
t5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000
s0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018
s3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000
s6 = fff00007ef07bd98
a0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008
a3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338
t8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800
t11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000
gp = ffffffff81d89690  sp = 00000000aa814126
Disabling lock debugging due to kernel taint
Trace:
[&lt;ffffffff81240844&gt;] si_dma_is_lockup+0x34/0xd0
[&lt;ffffffff81119610&gt;] radeon_fence_check_lockup+0xd0/0x290
[&lt;ffffffff80977010&gt;] process_one_work+0x280/0x550
[&lt;ffffffff80977350&gt;] worker_thread+0x70/0x7c0
[&lt;ffffffff80977410&gt;] worker_thread+0x130/0x7c0
[&lt;ffffffff80982040&gt;] kthread+0x200/0x210
[&lt;ffffffff809772e0&gt;] worker_thread+0x0/0x7c0
[&lt;ffffffff80981f8c&gt;] kthread+0x14c/0x210
[&lt;ffffffff80911658&gt;] ret_from_kernel_thread+0x18/0x20
[&lt;ffffffff80981e40&gt;] kthread+0x0/0x210
 Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101
 &lt;88210000&gt; 4821ed21
So force lockup work queue flush to fix this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48705</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48705" ref_url="https://www.suse.com/security/cve/CVE-2022-48705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix crash in chip reset fail

In case of drv own fail in reset, we may need to run mac_reset several
times. The sequence would trigger system crash as the log below.

Because we do not re-enable/schedule "tx_napi" before disable it again,
the process would keep waiting for state change in napi_diable(). To
avoid the problem and keep status synchronize for each run, goto final
resource handling if drv own failed.

[ 5857.353423] mt7921e 0000:3b:00.0: driver own failed
[ 5858.433427] mt7921e 0000:3b:00.0: Timeout for driver own
[ 5859.633430] mt7921e 0000:3b:00.0: driver own failed
[ 5859.633444] ------------[ cut here ]------------
[ 5859.633446] WARNING: CPU: 6 at kernel/kthread.c:659 kthread_park+0x11d
[ 5859.633717] Workqueue: mt76 mt7921_mac_reset_work [mt7921_common]
[ 5859.633728] RIP: 0010:kthread_park+0x11d/0x150
[ 5859.633736] RSP: 0018:ffff8881b676fc68 EFLAGS: 00010202
......
[ 5859.633766] Call Trace:
[ 5859.633768]  &lt;TASK&gt;
[ 5859.633771]  mt7921e_mac_reset+0x176/0x6f0 [mt7921e]
[ 5859.633778]  mt7921_mac_reset_work+0x184/0x3a0 [mt7921_common]
[ 5859.633785]  ? mt7921_mac_set_timing+0x520/0x520 [mt7921_common]
[ 5859.633794]  ? __kasan_check_read+0x11/0x20
[ 5859.633802]  process_one_work+0x7ee/0x1320
[ 5859.633810]  worker_thread+0x53c/0x1240
[ 5859.633818]  kthread+0x2b8/0x370
[ 5859.633824]  ? process_one_work+0x1320/0x1320
[ 5859.633828]  ? kthread_complete_and_exit+0x30/0x30
[ 5859.633834]  ret_from_fork+0x1f/0x30
[ 5859.633842]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48705/">CVE-2022-48705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48705">CVE-2022-48705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223895">SUSE bug 1223895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48706</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48706" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48706" ref_url="https://www.suse.com/security/cve/CVE-2022-48706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: ifcvf: Do proper cleanup if IFCVF init fails

ifcvf_mgmt_dev leaks memory if it is not freed before
returning. Call is made to correct return statement
so memory does not leak. ifcvf_init_hw does not take
care of this so it is needed to do it here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48706/">CVE-2022-48706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48706">CVE-2022-48706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225524">SUSE bug 1225524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48708</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48708" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: single: fix potential NULL dereference

Added checking of pointer "function" in pcs_set_mux().
pinmux_generic_get_function() can return NULL and the pointer
"function" was dereferenced without checking against NULL.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48709</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48709" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: switch: fix potential memleak in ice_add_adv_recipe()

When ice_add_special_words() fails, the 'rm' is not released, which will
lead to a memory leak. Fix this up by going to 'err_unroll' label.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48710</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix a possible null pointer dereference

In radeon_fp_native_mode(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.

The failure status of drm_cvt_mode() on the other path is checked too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48711</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48711" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48711" ref_url="https://www.suse.com/security/cve/CVE-2022-48711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: improve size validations for received domain records

The function tipc_mon_rcv() allows a node to receive and process
domain_record structs from peer nodes to track their views of the
network topology.

This patch verifies that the number of members in a received domain
record does not exceed the limit defined by MAX_MON_DOMAIN, something
that may otherwise lead to a stack overflow.

tipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where
we are reading a 32 bit message data length field into a uint16.  To
avert any risk of bit overflow, we add an extra sanity check for this in
that function.  We cannot see that happen with the current code, but
future designers being unaware of this risk, may introduce it by
allowing delivery of very large (&gt; 64k) sk buffers from the bearer
layer.  This potential problem was identified by Eric Dumazet.

This fixes CVE-2022-0435
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48711/">CVE-2022-48711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48711">CVE-2022-48711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227473">SUSE bug 1227473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48712</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48712" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix error handling in ext4_fc_record_modified_inode()

Current code does not fully takes care of krealloc() error case, which
could lead to silent memory corruption or a kernel bug.  This patch
fixes that.

Also it cleans up some duplicated error handling logic from various
functions in fast_commit.c file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48713</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48713" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/pt: Fix crash with stop filters in single-range mode

Add a check for !buf-&gt;single before calling pt_buffer_region_size in a
place where a missing check can cause a kernel crash.

Fixes a bug introduced by commit 670638477aed ("perf/x86/intel/pt:
Opportunistically use single range output mode"), which added a
support for PT single-range output mode. Since that commit if a PT
stop filter range is hit while tracing, the kernel will crash because
of a null pointer dereference in pt_handle_status due to calling
pt_buffer_region_size without a ToPA configured.

The commit which introduced single-range mode guarded almost all uses of
the ToPA buffer variables with checks of the buf-&gt;single variable, but
missed the case where tracing was stopped by the PT hardware, which
happens when execution hits a configured stop filter.

Tested that hitting a stop filter while PT recording successfully
records a trace with this patch but crashes without this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227549">SUSE bug 1227549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48714</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48714" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48714" ref_url="https://www.suse.com/security/cve/CVE-2022-48714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Use VM_MAP instead of VM_ALLOC for ringbuf

After commit 2fd3fb0be1d1 ("kasan, vmalloc: unpoison VM_ALLOC pages
after mapping"), non-VM_ALLOC mappings will be marked as accessible
in __get_vm_area_node() when KASAN is enabled. But now the flag for
ringbuf area is VM_ALLOC, so KASAN will complain out-of-bound access
after vmap() returns. Because the ringbuf area is created by mapping
allocated pages, so use VM_MAP instead.

After the change, info in /proc/vmallocinfo also changes from
  [start]-[end]   24576 ringbuf_map_alloc+0x171/0x290 vmalloc user
to
  [start]-[end]   24576 ringbuf_map_alloc+0x171/0x290 vmap user
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48714/">CVE-2022-48714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48714">CVE-2022-48714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226622">SUSE bug 1226622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48715</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe

Running tests with a debug kernel shows that bnx2fc_recv_frame() is
modifying the per_cpu lport stats counters in a non-mpsafe way.  Just boot
a debug kernel and run the bnx2fc driver with the hardware enabled.

[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_
[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]
[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G    B
[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013
[ 1391.699183] Call Trace:
[ 1391.699188]  dump_stack_lvl+0x57/0x7d
[ 1391.699198]  check_preemption_disabled+0xc8/0xd0
[ 1391.699205]  bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]
[ 1391.699215]  ? do_raw_spin_trylock+0xb5/0x180
[ 1391.699221]  ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]
[ 1391.699229]  ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]
[ 1391.699240]  bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]
[ 1391.699250]  ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]
[ 1391.699258]  kthread+0x364/0x420
[ 1391.699263]  ? _raw_spin_unlock_irq+0x24/0x50
[ 1391.699268]  ? set_kthread_struct+0x100/0x100
[ 1391.699273]  ret_from_fork+0x22/0x30

Restore the old get_cpu/put_cpu code with some modifications to reduce the
size of the critical section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48716</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48716" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48716" ref_url="https://www.suse.com/security/cve/CVE-2022-48716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd938x: fix incorrect used of portid

Mixer controls have the channel id in mixer-&gt;reg, which is not same
as port id. port id should be derived from chan_info array.
So fix this. Without this, its possible that we could corrupt
struct wcd938x_sdw_priv by accessing port_map array out of range
with channel id instead of port id.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48716/">CVE-2022-48716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48716">CVE-2022-48716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226678">SUSE bug 1226678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48717</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48717" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: max9759: fix underflow in speaker_gain_control_put()

Check for negative values of "priv-&gt;gain" to prevent an out of bounds
access.  The concern is that these might come from the user via:
  -&gt; snd_ctl_elem_write_user()
    -&gt; snd_ctl_elem_write()
      -&gt; kctl-&gt;put()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48718</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48718" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48718" ref_url="https://www.suse.com/security/cve/CVE-2022-48718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: mxsfb: Fix NULL pointer dereference

mxsfb should not ever dereference the NULL pointer which
drm_atomic_get_new_bridge_state is allowed to return.
Assume a fixed format instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48718/">CVE-2022-48718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48718">CVE-2022-48718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226616">SUSE bug 1226616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48720</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macsec: Fix offload support for NETDEV_UNREGISTER event

Current macsec netdev notify handler handles NETDEV_UNREGISTER event by
releasing relevant SW resources only, this causes resources leak in case
of macsec HW offload, as the underlay driver was not notified to clean
it's macsec offload resources.

Fix by calling the underlay driver to clean it's relevant resources
by moving offload handling from macsec_dellink() to macsec_common_dellink()
when handling NETDEV_UNREGISTER event.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48721</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Forward wakeup to smc socket waitqueue after fallback

When we replace TCP with SMC and a fallback occurs, there may be
some socket waitqueue entries remaining in smc socket-&gt;wq, such
as eppoll_entries inserted by userspace applications.

After the fallback, data flows over TCP/IP and only clcsocket-&gt;wq
will be woken up. Applications can't be notified by the entries
which were inserted in smc socket-&gt;wq before fallback. So we need
a mechanism to wake up smc socket-&gt;wq at the same time if some
entries remaining in it.

The current workaround is to transfer the entries from smc socket-&gt;wq
to clcsock-&gt;wq during the fallback. But this may cause a crash
like this:

 general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP PTI
 CPU: 3 PID: 0 Comm: swapper/3 Kdump: loaded Tainted: G E     5.16.0+ #107
 RIP: 0010:__wake_up_common+0x65/0x170
 Call Trace:
  &lt;IRQ&gt;
  __wake_up_common_lock+0x7a/0xc0
  sock_def_readable+0x3c/0x70
  tcp_data_queue+0x4a7/0xc40
  tcp_rcv_established+0x32f/0x660
  ? sk_filter_trim_cap+0xcb/0x2e0
  tcp_v4_do_rcv+0x10b/0x260
  tcp_v4_rcv+0xd2a/0xde0
  ip_protocol_deliver_rcu+0x3b/0x1d0
  ip_local_deliver_finish+0x54/0x60
  ip_local_deliver+0x6a/0x110
  ? tcp_v4_early_demux+0xa2/0x140
  ? tcp_v4_early_demux+0x10d/0x140
  ip_sublist_rcv_finish+0x49/0x60
  ip_sublist_rcv+0x19d/0x230
  ip_list_rcv+0x13e/0x170
  __netif_receive_skb_list_core+0x1c2/0x240
  netif_receive_skb_list_internal+0x1e6/0x320
  napi_complete_done+0x11d/0x190
  mlx5e_napi_poll+0x163/0x6b0 [mlx5_core]
  __napi_poll+0x3c/0x1b0
  net_rx_action+0x27c/0x300
  __do_softirq+0x114/0x2d2
  irq_exit_rcu+0xb4/0xe0
  common_interrupt+0xba/0xe0
  &lt;/IRQ&gt;
  &lt;TASK&gt;

The crash is caused by privately transferring waitqueue entries from
smc socket-&gt;wq to clcsock-&gt;wq. The owners of these entries, such as
epoll, have no idea that the entries have been transferred to a
different socket wait queue and still use original waitqueue spinlock
(smc socket-&gt;wq.wait.lock) to make the entries operation exclusive,
but it doesn't work. The operations to the entries, such as removing
from the waitqueue (now is clcsock-&gt;wq after fallback), may cause a
crash when clcsock waitqueue is being iterated over at the moment.

This patch tries to fix this by no longer transferring wait queue
entries privately, but introducing own implementations of clcsock's
callback functions in fallback situation. The callback functions will
forward the wakeup to smc socket-&gt;wq if clcsock-&gt;wq is actually woken
up and smc socket-&gt;wq has remaining entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48722</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48722" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: ca8210: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. We then leak the skb
structure.

Free the skb structure upon error before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48723</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48723" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: uniphier: fix reference count leak in uniphier_spi_probe()

The issue happens in several error paths in uniphier_spi_probe().
When either dma_get_slave_caps() or devm_spi_register_master() returns
an error code, the function forgets to decrease the refcount of both
`dma_rx` and `dma_tx` objects, which may lead to refcount leaks.

Fix it by decrementing the reference count of specific objects in
those error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48724</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48724" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()

After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node
unconditionally allocated"). For tear down scenario, fn is only freed
after fail to allocate ir_domain, though it also should be freed in case
dmar_enable_qi returns error.

Besides free fn, irq_domain and ir_msi_domain need to be removed as well
if intel_setup_irq_remapping fails to enable queued invalidation.

Improve the rewinding path by add out_free_ir_domain and out_free_fwnode
lables per Baolu's suggestion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48725</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48725" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix refcounting leak in siw_create_qp()

The atomic_inc() needs to be paired with an atomic_dec() on the error
path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48726</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48726" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/ucma: Protect mc during concurrent multicast leaves

Partially revert the commit mentioned in the Fixes line to make sure that
allocation and erasing multicast struct are locked.

  BUG: KASAN: use-after-free in ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]
  BUG: KASAN: use-after-free in ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579
  Read of size 8 at addr ffff88801bb74b00 by task syz-executor.1/25529
  CPU: 0 PID: 25529 Comm: syz-executor.1 Not tainted 5.16.0-rc7-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
   print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247
   __kasan_report mm/kasan/report.c:433 [inline]
   kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
   ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]
   ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579
   ucma_destroy_id+0x1e6/0x280 drivers/infiniband/core/ucma.c:614
   ucma_write+0x25c/0x350 drivers/infiniband/core/ucma.c:1732
   vfs_write+0x28e/0xae0 fs/read_write.c:588
   ksys_write+0x1ee/0x250 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Currently the xarray search can touch a concurrently freeing mc as the
xa_for_each() is not surrounded by any lock. Rather than hold the lock for
a full scan hold it only for the effected items, which is usually an empty
list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227552">SUSE bug 1227552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48727" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Avoid consuming a stale esr value when SError occur

When any exception other than an IRQ occurs, the CPU updates the ESR_EL2
register with the exception syndrome. An SError may also become pending,
and will be synchronised by KVM. KVM notes the exception type, and whether
an SError was synchronised in exit_code.

When an exception other than an IRQ occurs, fixup_guest_exit() updates
vcpu-&gt;arch.fault.esr_el2 from the hardware register. When an SError was
synchronised, the vcpu esr value is used to determine if the exception
was due to an HVC. If so, ELR_EL2 is moved back one instruction. This
is so that KVM can process the SError first, and re-execute the HVC if
the guest survives the SError.

But if an IRQ synchronises an SError, the vcpu's esr value is stale.
If the previous non-IRQ exception was an HVC, KVM will corrupt ELR_EL2,
causing an unrelated guest instruction to be executed twice.

Check ARM_EXCEPTION_CODE() before messing with ELR_EL2, IRQs don't
update this register so don't need to check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48728</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48728" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix AIP early init panic

An early failure in hfi1_ipoib_setup_rn() can lead to the following panic:

  BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0
  PGD 0 P4D 0
  Oops: 0002 [#1] SMP NOPTI
  Workqueue: events work_for_cpu_fn
  RIP: 0010:try_to_grab_pending+0x2b/0x140
  Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 &lt;f0&gt; 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c
  RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046
  RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000
  RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0
  RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001
  R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
  R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690
  FS:  0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   __cancel_work_timer+0x42/0x190
   ? dev_printk_emit+0x4e/0x70
   iowait_cancel_work+0x15/0x30 [hfi1]
   hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]
   ? dev_err+0x6c/0x90
   hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]
   hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]
   rdma_init_netdev+0x5a/0x80 [ib_core]
   ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]
   ipoib_intf_init+0x6c/0x350 [ib_ipoib]
   ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]
   ipoib_add_one+0xbe/0x300 [ib_ipoib]
   add_client_context+0x12c/0x1a0 [ib_core]
   enable_device_and_get+0xdc/0x1d0 [ib_core]
   ib_register_device+0x572/0x6b0 [ib_core]
   rvt_register_device+0x11b/0x220 [rdmavt]
   hfi1_register_ib_device+0x6b4/0x770 [hfi1]
   do_init_one.isra.20+0x3e3/0x680 [hfi1]
   local_pci_probe+0x41/0x90
   work_for_cpu_fn+0x16/0x20
   process_one_work+0x1a7/0x360
   ? create_worker+0x1a0/0x1a0
   worker_thread+0x1cf/0x390
   ? create_worker+0x1a0/0x1a0
   kthread+0x116/0x130
   ? kthread_flush_work_fn+0x10/0x10
   ret_from_fork+0x1f/0x40

The panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL
deref when hfi1_ipoib_netdev_dtor() is called in this error case.

hfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so
fix by adjusting the error paths accordingly.

Other changes:
- hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()
  since the netdev core code deletes calls free_netdev()
- The switch to the accelerated entrances is moved to the success path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48729</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix panic with larger ipoib send_queue_size

When the ipoib send_queue_size is increased from the default the following
panic happens:

  RIP: 0010:hfi1_ipoib_drain_tx_ring+0x45/0xf0 [hfi1]
  Code: 31 e4 eb 0f 8b 85 c8 02 00 00 41 83 c4 01 44 39 e0 76 60 8b 8d cc 02 00 00 44 89 e3 be 01 00 00 00 d3 e3 48 03 9d c0 02 00 00 &lt;c7&gt; 83 18 01 00 00 00 00 00 00 48 8b bb 30 01 00 00 e8 25 af a7 e0
  RSP: 0018:ffffc9000798f4a0 EFLAGS: 00010286
  RAX: 0000000000008000 RBX: ffffc9000aa0f000 RCX: 000000000000000f
  RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
  RBP: ffff88810ff08000 R08: ffff88889476d900 R09: 0000000000000101
  R10: 0000000000000000 R11: ffffc90006590ff8 R12: 0000000000000200
  R13: ffffc9000798fba8 R14: 0000000000000000 R15: 0000000000000001
  FS:  00007fd0f79cc3c0(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffc9000aa0f118 CR3: 0000000889c84001 CR4: 00000000001706e0
  Call Trace:
   &lt;TASK&gt;
   hfi1_ipoib_napi_tx_disable+0x45/0x60 [hfi1]
   hfi1_ipoib_dev_stop+0x18/0x80 [hfi1]
   ipoib_ib_dev_stop+0x1d/0x40 [ib_ipoib]
   ipoib_stop+0x48/0xc0 [ib_ipoib]
   __dev_close_many+0x9e/0x110
   __dev_change_flags+0xd9/0x210
   dev_change_flags+0x21/0x60
   do_setlink+0x31c/0x10f0
   ? __nla_validate_parse+0x12d/0x1a0
   ? __nla_parse+0x21/0x30
   ? inet6_validate_link_af+0x5e/0xf0
   ? cpumask_next+0x1f/0x20
   ? __snmp6_fill_stats64.isra.53+0xbb/0x140
   ? __nla_validate_parse+0x47/0x1a0
   __rtnl_newlink+0x530/0x910
   ? pskb_expand_head+0x73/0x300
   ? __kmalloc_node_track_caller+0x109/0x280
   ? __nla_put+0xc/0x20
   ? cpumask_next_and+0x20/0x30
   ? update_sd_lb_stats.constprop.144+0xd3/0x820
   ? _raw_spin_unlock_irqrestore+0x25/0x37
   ? __wake_up_common_lock+0x87/0xc0
   ? kmem_cache_alloc_trace+0x3d/0x3d0
   rtnl_newlink+0x43/0x60

The issue happens when the shift that should have been a function of the
txq item size mistakenly used the ring size.

Fix by using the item size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48730</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48730" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf: heaps: Fix potential spectre v1 gadget

It appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.

 [sumits: added fixes and cc: stable tags]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48732</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48732" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix off by one in BIOS boundary checking

Bounds checking when parsing init scripts embedded in the BIOS reject
access to the last byte. This causes driver initialization to fail on
Apple eMac's with GeForce 2 MX GPUs, leaving the system with no working
console.

This is probably only seen on OpenFirmware machines like PowerPC Macs
because the BIOS image provided by OF is only the used parts of the ROM,
not a power-of-two blocks read from PCI directly so PCs always have
empty bytes at the end that are never accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48733" ref_url="https://www.suse.com/security/cve/CVE-2022-48733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free after failure to create a snapshot

At ioctl.c:create_snapshot(), we allocate a pending snapshot structure and
then attach it to the transaction's list of pending snapshots. After that
we call btrfs_commit_transaction(), and if that returns an error we jump
to 'fail' label, where we kfree() the pending snapshot structure. This can
result in a later use-after-free of the pending snapshot:

1) We allocated the pending snapshot and added it to the transaction's
   list of pending snapshots;

2) We call btrfs_commit_transaction(), and it fails either at the first
   call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups().
   In both cases, we don't abort the transaction and we release our
   transaction handle. We jump to the 'fail' label and free the pending
   snapshot structure. We return with the pending snapshot still in the
   transaction's list;

3) Another task commits the transaction. This time there's no error at
   all, and then during the transaction commit it accesses a pointer
   to the pending snapshot structure that the snapshot creation task
   has already freed, resulting in a user-after-free.

This issue could actually be detected by smatch, which produced the
following warning:

  fs/btrfs/ioctl.c:843 create_snapshot() warn: '&amp;pending_snapshot-&gt;list' not removed from list

So fix this by not having the snapshot creation ioctl directly add the
pending snapshot to the transaction's list. Instead add the pending
snapshot to the transaction handle, and then at btrfs_commit_transaction()
we add the snapshot to the list only when we can guarantee that any error
returned after that point will result in a transaction abort, in which
case the ioctl code can safely free the pending snapshot and no one can
access it anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48733/">CVE-2022-48733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48733">CVE-2022-48733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226718">SUSE bug 1226718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48734</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48734" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock between quota disable and qgroup rescan worker

Quota disable ioctl starts a transaction before waiting for the qgroup
rescan worker completes. However, this wait can be infinite and results
in deadlock because of circular dependency among the quota disable
ioctl, the qgroup rescan worker and the other task with transaction such
as block group relocation task.

The deadlock happens with the steps following:

1) Task A calls ioctl to disable quota. It starts a transaction and
   waits for qgroup rescan worker completes.
2) Task B such as block group relocation task starts a transaction and
   joins to the transaction that task A started. Then task B commits to
   the transaction. In this commit, task B waits for a commit by task A.
3) Task C as the qgroup rescan worker starts its job and starts a
   transaction. In this transaction start, task C waits for completion
   of the transaction that task A started and task B committed.

This deadlock was found with fstests test case btrfs/115 and a zoned
null_blk device. The test case enables and disables quota, and the
block group reclaim was triggered during the quota disable by chance.
The deadlock was also observed by running quota enable and disable in
parallel with 'btrfs balance' command on regular null_blk devices.

An example report of the deadlock:

  [372.469894] INFO: task kworker/u16:6:103 blocked for more than 122 seconds.
  [372.479944]       Not tainted 5.16.0-rc8 #7
  [372.485067] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  [372.493898] task:kworker/u16:6   state:D stack:    0 pid:  103 ppid:     2 flags:0x00004000
  [372.503285] Workqueue: btrfs-qgroup-rescan btrfs_work_helper [btrfs]
  [372.510782] Call Trace:
  [372.514092]  &lt;TASK&gt;
  [372.521684]  __schedule+0xb56/0x4850
  [372.530104]  ? io_schedule_timeout+0x190/0x190
  [372.538842]  ? lockdep_hardirqs_on+0x7e/0x100
  [372.547092]  ? _raw_spin_unlock_irqrestore+0x3e/0x60
  [372.555591]  schedule+0xe0/0x270
  [372.561894]  btrfs_commit_transaction+0x18bb/0x2610 [btrfs]
  [372.570506]  ? btrfs_apply_pending_changes+0x50/0x50 [btrfs]
  [372.578875]  ? free_unref_page+0x3f2/0x650
  [372.585484]  ? finish_wait+0x270/0x270
  [372.591594]  ? release_extent_buffer+0x224/0x420 [btrfs]
  [372.599264]  btrfs_qgroup_rescan_worker+0xc13/0x10c0 [btrfs]
  [372.607157]  ? lock_release+0x3a9/0x6d0
  [372.613054]  ? btrfs_qgroup_account_extent+0xda0/0xda0 [btrfs]
  [372.620960]  ? do_raw_spin_lock+0x11e/0x250
  [372.627137]  ? rwlock_bug.part.0+0x90/0x90
  [372.633215]  ? lock_is_held_type+0xe4/0x140
  [372.639404]  btrfs_work_helper+0x1ae/0xa90 [btrfs]
  [372.646268]  process_one_work+0x7e9/0x1320
  [372.652321]  ? lock_release+0x6d0/0x6d0
  [372.658081]  ? pwq_dec_nr_in_flight+0x230/0x230
  [372.664513]  ? rwlock_bug.part.0+0x90/0x90
  [372.670529]  worker_thread+0x59e/0xf90
  [372.676172]  ? process_one_work+0x1320/0x1320
  [372.682440]  kthread+0x3b9/0x490
  [372.687550]  ? _raw_spin_unlock_irq+0x24/0x50
  [372.693811]  ? set_kthread_struct+0x100/0x100
  [372.700052]  ret_from_fork+0x22/0x30
  [372.705517]  &lt;/TASK&gt;
  [372.709747] INFO: task btrfs-transacti:2347 blocked for more than 123 seconds.
  [372.729827]       Not tainted 5.16.0-rc8 #7
  [372.745907] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  [372.767106] task:btrfs-transacti state:D stack:    0 pid: 2347 ppid:     2 flags:0x00004000
  [372.787776] Call Trace:
  [372.801652]  &lt;TASK&gt;
  [372.812961]  __schedule+0xb56/0x4850
  [372.830011]  ? io_schedule_timeout+0x190/0x190
  [372.852547]  ? lockdep_hardirqs_on+0x7e/0x100
  [372.871761]  ? _raw_spin_unlock_irqrestore+0x3e/0x60
  [372.886792]  schedule+0xe0/0x270
  [372.901685]  wait_current_trans+0x22c/0x310 [btrfs]
  [372.919743]  ? btrfs_put_transaction+0x3d0/0x3d0 [btrfs]
  [372.938923]  ? finish_wait+0x270/0x270
  [372.959085]  ? join_transaction+0xc7
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix UAF of leds class devs at unbinding

The LED class devices that are created by HD-audio codec drivers are
registered via devm_led_classdev_register() and associated with the
HD-audio codec device.  Unfortunately, it turned out that the devres
release doesn't work for this case; namely, since the codec resource
release happens before the devm call chain, it triggers a NULL
dereference or a UAF for a stale set_brightness_delay callback.

For fixing the bug, this patch changes the LED class device register
and unregister in a manual manner without devres, keeping the
instances in hda_gen_spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227438">SUSE bug 1227438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48736</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48736" ref_url="https://www.suse.com/security/cve/CVE-2022-48736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48736/">CVE-2022-48736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48736">CVE-2022-48736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226721">SUSE bug 1226721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48737" ref_url="https://www.suse.com/security/cve/CVE-2022-48737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48737/">CVE-2022-48737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48737">CVE-2022-48737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226762">SUSE bug 1226762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()

We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: hdmi-codec: Fix OOB memory accesses

Correct size of iec_status array by changing it to the size of status
array of the struct snd_aes_iec958. This fixes out-of-bounds slab
read accesses made by memcpy() of the hdmi-codec driver. This problem
is reported by KASAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48740</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: fix double free of cond_list on error paths

On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref.  Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.

Also consistently reset the cond_list pointer to NULL after freeing.

[PM: fix line lengths in the description]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: amd-xgbe: Fix skb data length underflow

There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.

Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Avoid field-overflowing memcpy()

In preparation for FORTIFY_SOURCE performing compile-time and run-time
field bounds checking for memcpy(), memmove(), and memset(), avoid
intentionally writing across neighboring fields.

Use flexible arrays instead of zero-element arrays (which look like they
are always overflowing) and split the cross-field memcpy() into two halves
that can be appropriately bounds-checked by the compiler.

We were doing:

	#define ETH_HLEN  14
	#define VLAN_HLEN  4
	...
	#define MLX5E_XDP_MIN_INLINE (ETH_HLEN + VLAN_HLEN)
	...
        struct mlx5e_tx_wqe      *wqe  = mlx5_wq_cyc_get_wqe(wq, pi);
	...
        struct mlx5_wqe_eth_seg  *eseg = &amp;wqe-&gt;eth;
        struct mlx5_wqe_data_seg *dseg = wqe-&gt;data;
	...
	memcpy(eseg-&gt;inline_hdr.start, xdptxd-&gt;data, MLX5E_XDP_MIN_INLINE);

target is wqe-&gt;eth.inline_hdr.start (which the compiler sees as being
2 bytes in size), but copying 18, intending to write across start
(really vlan_tci, 2 bytes). The remaining 16 bytes get written into
wqe-&gt;data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr
(8 bytes).

struct mlx5e_tx_wqe {
        struct mlx5_wqe_ctrl_seg   ctrl;                 /*     0    16 */
        struct mlx5_wqe_eth_seg    eth;                  /*    16    16 */
        struct mlx5_wqe_data_seg   data[];               /*    32     0 */

        /* size: 32, cachelines: 1, members: 3 */
        /* last cacheline: 32 bytes */
};

struct mlx5_wqe_eth_seg {
        u8                         swp_outer_l4_offset;  /*     0     1 */
        u8                         swp_outer_l3_offset;  /*     1     1 */
        u8                         swp_inner_l4_offset;  /*     2     1 */
        u8                         swp_inner_l3_offset;  /*     3     1 */
        u8                         cs_flags;             /*     4     1 */
        u8                         swp_flags;            /*     5     1 */
        __be16                     mss;                  /*     6     2 */
        __be32                     flow_table_metadata;  /*     8     4 */
        union {
                struct {
                        __be16     sz;                   /*    12     2 */
                        u8         start[2];             /*    14     2 */
                } inline_hdr;                            /*    12     4 */
                struct {
                        __be16     type;                 /*    12     2 */
                        __be16     vlan_tci;             /*    14     2 */
                } insert;                                /*    12     4 */
                __be32             trailer;              /*    12     4 */
        };                                               /*    12     4 */

        /* size: 16, cachelines: 1, members: 9 */
        /* last cacheline: 16 bytes */
};

struct mlx5_wqe_data_seg {
        __be32                     byte_count;           /*     0     4 */
        __be32                     lkey;                 /*     4     4 */
        __be64                     addr;                 /*     8     8 */

        /* size: 16, cachelines: 1, members: 3 */
        /* last cacheline: 16 bytes */
};

So, split the memcpy() so the compiler can reason about the buffer
sizes.

"pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe
nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object
code changes (i.e. only source line number induced differences and
optimizations).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Use del_timer_sync in fw reset flow of halting poll

Substitute del_timer() with del_timer_sync() in fw reset polling
deactivation flow, in order to prevent a race condition which occurs
when del_timer() is called and timer is deactivated while another
process is handling the timer interrupt. A situation that led to
the following call trace:
	RIP: 0010:run_timer_softirq+0x137/0x420
	&lt;IRQ&gt;
	recalibrate_cpu_khz+0x10/0x10
	ktime_get+0x3e/0xa0
	? sched_clock_cpu+0xb/0xc0
	__do_softirq+0xf5/0x2ea
	irq_exit_rcu+0xc1/0xf0
	sysvec_apic_timer_interrupt+0x9e/0xc0
	asm_sysvec_apic_timer_interrupt+0x12/0x20
	&lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix handling of wrong devices during bond netevent

Current implementation of bond netevent handler only check if
the handled netdev is VF representor and it missing a check if
the VF representor is on the same phys device of the bond handling
the netevent.

Fix by adding the missing check and optimizing the check if
the netdev is VF representor so it will not access uninitialized
private data and crashes.

BUG: kernel NULL pointer dereference, address: 000000000000036c
PGD 0 P4D 0
Oops: 0000 [#1] SMP NOPTI
Workqueue: eth3bond0 bond_mii_monitor [bonding]
RIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core]
RSP: 0018:ffff88812d69fd60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000
RDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880
RBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008
R10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10
R13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core]
 mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core]
 mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core]
 raw_notifier_call_chain+0x41/0x60
 call_netdevice_notifiers_info+0x34/0x80
 netdev_lower_state_changed+0x4e/0xa0
 bond_mii_monitor+0x56b/0x640 [bonding]
 process_one_work+0x1b9/0x390
 worker_thread+0x4d/0x3d0
 ? rescuer_thread+0x350/0x350
 kthread+0x124/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix wrong offset in bio_truncate()

bio_truncate() clears the buffer outside of last block of bdev, however
current bio_truncate() is using the wrong offset of page. So it can
return the uninitialized data.

This happened when both of truncated/corrupted FS and userspace (via
bdev) are trying to read the last of bdev.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48748</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48748" ref_url="https://www.suse.com/security/cve/CVE-2022-48748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: vlan: fix memory leak in __allowed_ingress

When using per-vlan state, if vlan snooping and stats are disabled,
untagged or priority-tagged ingress frame will go to check pvid state.
If the port state is forwarding and the pvid state is not
learning/forwarding, untagged or priority-tagged frame will be dropped
but skb memory is not freed.
Should free skb when __allowed_ingress returns false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48748/">CVE-2022-48748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48748">CVE-2022-48748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226647">SUSE bug 1226647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48749</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48749" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc

The function performs a check on the "ctx" input parameter, however, it
is used before the check.

Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.

Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48751</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48751" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Transitional solution for clcsock race issue

We encountered a crash in smc_setsockopt() and it is caused by
accessing smc-&gt;clcsock after clcsock was released.

 BUG: kernel NULL pointer dereference, address: 0000000000000020
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 50309 Comm: nginx Kdump: loaded Tainted: G E     5.16.0-rc4+ #53
 RIP: 0010:smc_setsockopt+0x59/0x280 [smc]
 Call Trace:
  &lt;TASK&gt;
  __sys_setsockopt+0xfc/0x190
  __x64_sys_setsockopt+0x20/0x30
  do_syscall_64+0x34/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f16ba83918e
  &lt;/TASK&gt;

This patch tries to fix it by holding clcsock_release_lock and
checking whether clcsock has already been released before access.

In case that a crash of the same reason happens in smc_getsockopt()
or smc_switch_to_fallback(), this patch also checkes smc-&gt;clcsock
in them too. And the caller of smc_switch_to_fallback() will identify
whether fallback succeeds according to the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48752</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48752" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending

Running selftest with CONFIG_PPC_IRQ_SOFT_MASK_DEBUG enabled in kernel
triggered below warning:

[  172.851380] ------------[ cut here ]------------
[  172.851391] WARNING: CPU: 8 PID: 2901 at arch/powerpc/include/asm/hw_irq.h:246 power_pmu_disable+0x270/0x280
[  172.851402] Modules linked in: dm_mod bonding nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc xfs libcrc32c pseries_rng xts vmx_crypto uio_pdrv_genirq uio sch_fq_codel ip_tables ext4 mbcache jbd2 sd_mod t10_pi sg ibmvscsi ibmveth scsi_transport_srp fuse
[  172.851442] CPU: 8 PID: 2901 Comm: lost_exception_ Not tainted 5.16.0-rc5-03218-g798527287598 #2
[  172.851451] NIP:  c00000000013d600 LR: c00000000013d5a4 CTR: c00000000013b180
[  172.851458] REGS: c000000017687860 TRAP: 0700   Not tainted  (5.16.0-rc5-03218-g798527287598)
[  172.851465] MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 48004884  XER: 20040000
[  172.851482] CFAR: c00000000013d5b4 IRQMASK: 1
[  172.851482] GPR00: c00000000013d5a4 c000000017687b00 c000000002a10600 0000000000000004
[  172.851482] GPR04: 0000000082004000 c0000008ba08f0a8 0000000000000000 00000008b7ed0000
[  172.851482] GPR08: 00000000446194f6 0000000000008000 c00000000013b118 c000000000d58e68
[  172.851482] GPR12: c00000000013d390 c00000001ec54a80 0000000000000000 0000000000000000
[  172.851482] GPR16: 0000000000000000 0000000000000000 c000000015d5c708 c0000000025396d0
[  172.851482] GPR20: 0000000000000000 0000000000000000 c00000000a3bbf40 0000000000000003
[  172.851482] GPR24: 0000000000000000 c0000008ba097400 c0000000161e0d00 c00000000a3bb600
[  172.851482] GPR28: c000000015d5c700 0000000000000001 0000000082384090 c0000008ba0020d8
[  172.851549] NIP [c00000000013d600] power_pmu_disable+0x270/0x280
[  172.851557] LR [c00000000013d5a4] power_pmu_disable+0x214/0x280
[  172.851565] Call Trace:
[  172.851568] [c000000017687b00] [c00000000013d5a4] power_pmu_disable+0x214/0x280 (unreliable)
[  172.851579] [c000000017687b40] [c0000000003403ac] perf_pmu_disable+0x4c/0x60
[  172.851588] [c000000017687b60] [c0000000003445e4] __perf_event_task_sched_out+0x1d4/0x660
[  172.851596] [c000000017687c50] [c000000000d1175c] __schedule+0xbcc/0x12a0
[  172.851602] [c000000017687d60] [c000000000d11ea8] schedule+0x78/0x140
[  172.851608] [c000000017687d90] [c0000000001a8080] sys_sched_yield+0x20/0x40
[  172.851615] [c000000017687db0] [c0000000000334dc] system_call_exception+0x18c/0x380
[  172.851622] [c000000017687e10] [c00000000000c74c] system_call_common+0xec/0x268

The warning indicates that MSR_EE being set(interrupt enabled) when
there was an overflown PMC detected. This could happen in
power_pmu_disable since it runs under interrupt soft disable
condition ( local_irq_save ) and not with interrupts hard disabled.
commit 2c9ac51b850d ("powerpc/perf: Fix PMU callbacks to clear
pending PMI before resetting an overflown PMC") intended to clear
PMI pending bit in Paca when disabling the PMU. It could happen
that PMC gets overflown while code is in power_pmu_disable
callback function. Hence add a check to see if PMI pending bit
is set in Paca before clearing it via clear_pmi_pending.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48753" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48753" ref_url="https://www.suse.com/security/cve/CVE-2022-48753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix memory leak in disk_register_independent_access_ranges

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add()

   If this function returns an error, kobject_put() must be called to
   properly clean up the memory associated with the object.

Fix this issue by adding kobject_put().
Callback function blk_ia_ranges_sysfs_release() in kobject_put()
can handle the pointer "iars" properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48753/">CVE-2022-48753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48753">CVE-2022-48753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226693">SUSE bug 1226693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48754" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phylib: fix potential use-after-free

Commit bafbdd527d56 ("phylib: Add device reset GPIO support") added call
to phy_device_reset(phydev) after the put_device() call in phy_detach().

The comment before the put_device() call says that the phydev might go
away with put_device().

Fix potential use-after-free by calling phy_device_reset() before
put_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48755</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48755" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48755" ref_url="https://www.suse.com/security/cve/CVE-2022-48755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06

Johan reported the below crash with test_bpf on ppc64 e5500:

  test_bpf: #296 ALU_END_FROM_LE 64: 0x0123456789abcdef -&gt; 0x67452301 jited:1
  Oops: Exception in kernel mode, sig: 4 [#1]
  BE PAGE_SIZE=4K SMP NR_CPUS=24 QEMU e500
  Modules linked in: test_bpf(+)
  CPU: 0 PID: 76 Comm: insmod Not tainted 5.14.0-03771-g98c2059e008a-dirty #1
  NIP:  8000000000061c3c LR: 80000000006dea64 CTR: 8000000000061c18
  REGS: c0000000032d3420 TRAP: 0700   Not tainted (5.14.0-03771-g98c2059e008a-dirty)
  MSR:  0000000080089000 &lt;EE,ME&gt;  CR: 88002822  XER: 20000000 IRQMASK: 0
  &lt;...&gt;
  NIP [8000000000061c3c] 0x8000000000061c3c
  LR [80000000006dea64] .__run_one+0x104/0x17c [test_bpf]
  Call Trace:
   .__run_one+0x60/0x17c [test_bpf] (unreliable)
   .test_bpf_init+0x6a8/0xdc8 [test_bpf]
   .do_one_initcall+0x6c/0x28c
   .do_init_module+0x68/0x28c
   .load_module+0x2460/0x2abc
   .__do_sys_init_module+0x120/0x18c
   .system_call_exception+0x110/0x1b8
   system_call_common+0xf0/0x210
  --- interrupt: c00 at 0x101d0acc
  &lt;...&gt;
  ---[ end trace 47b2bf19090bb3d0 ]---

  Illegal instruction

The illegal instruction turned out to be 'ldbrx' emitted for
BPF_FROM_[L|B]E, which was only introduced in ISA v2.06. Guard use of
the same and implement an alternative approach for older processors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48755/">CVE-2022-48755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48755">CVE-2022-48755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226706">SUSE bug 1226706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48756</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48756" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable

The function performs a check on the "phy" input parameter, however, it
is used before the check.

Initialize the "dev" variable after the sanity check to avoid a possible
NULL pointer dereference.

Addresses-Coverity-ID: 1493860 ("Null pointer dereference")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48758</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48758" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()

The bnx2fc_destroy() functions are removing the interface before calling
destroy_work. This results multiple WARNings from sysfs_remove_group() as
the controller rport device attributes are removed too early.

Replace the fcoe_port's destroy_work queue. It's not needed.

The problem is easily reproducible with the following steps.

Example:

  $ dmesg -w &amp;
  $ systemctl enable --now fcoe
  $ fipvlan -s -c ens2f1
  $ fcoeadm -d ens2f1.802
  [  583.464488] host2: libfc: Link down on port (7500a1)
  [  583.472651] bnx2fc: 7500a1 - rport not created Yet!!
  [  583.490468] ------------[ cut here ]------------
  [  583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0'
  [  583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80
  [  583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...
  [  583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1
  [  583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013
  [  584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]
  [  584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80
  [  584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...
  [  584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282
  [  584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000
  [  584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0
  [  584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00
  [  584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400
  [  584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004
  [  584.355379] FS:  0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000
  [  584.394419] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [  584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0
  [  584.454888] Call Trace:
  [  584.466108]  device_del+0xb2/0x3e0
  [  584.481701]  device_unregister+0x13/0x60
  [  584.501306]  bsg_unregister_queue+0x5b/0x80
  [  584.522029]  bsg_remove_queue+0x1c/0x40
  [  584.541884]  fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]
  [  584.573823]  process_one_work+0x1e3/0x3b0
  [  584.592396]  worker_thread+0x50/0x3b0
  [  584.609256]  ? rescuer_thread+0x370/0x370
  [  584.628877]  kthread+0x149/0x170
  [  584.643673]  ? set_kthread_struct+0x40/0x40
  [  584.662909]  ret_from_fork+0x22/0x30
  [  584.680002] ---[ end trace 53575ecefa942ece ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48759</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48759" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev

struct rpmsg_ctrldev contains a struct cdev. The current code frees
the rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the
cdev is a managed object, therefore its release is not predictable
and the rpmsg_ctrldev could be freed before the cdev is entirely
released, as in the backtrace below.

[   93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c
[   93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0
[   93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v
[   93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G    B             5.4.163-lockdep #26
[   93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)
[   93.730055] Workqueue: events kobject_delayed_cleanup
[   93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)
[   93.740216] pc : debug_print_object+0x13c/0x1b0
[   93.744890] lr : debug_print_object+0x13c/0x1b0
[   93.749555] sp : ffffffacf5bc7940
[   93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000
[   93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000
[   93.763916] x25: ffffffd0734f856c x24: dfffffd000000000
[   93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0
[   93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0
[   93.780338] x19: ffffffd075199100 x18: 00000000000276e0
[   93.785814] x17: 0000000000000000 x16: dfffffd000000000
[   93.791291] x15: ffffffffffffffff x14: 6e6968207473696c
[   93.796768] x13: 0000000000000000 x12: ffffffd075e2b000
[   93.802244] x11: 0000000000000001 x10: 0000000000000000
[   93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900
[   93.813200] x7 : 0000000000000000 x6 : 0000000000000000
[   93.818676] x5 : 0000000000000080 x4 : 0000000000000000
[   93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001
[   93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061
[   93.835104] Call trace:
[   93.837644]  debug_print_object+0x13c/0x1b0
[   93.841963]  __debug_check_no_obj_freed+0x25c/0x3c0
[   93.846987]  debug_check_no_obj_freed+0x18/0x20
[   93.851669]  slab_free_freelist_hook+0xbc/0x1e4
[   93.856346]  kfree+0xfc/0x2f4
[   93.859416]  rpmsg_ctrldev_release_device+0x78/0xb8
[   93.864445]  device_release+0x84/0x168
[   93.868310]  kobject_cleanup+0x12c/0x298
[   93.872356]  kobject_delayed_cleanup+0x10/0x18
[   93.876948]  process_one_work+0x578/0x92c
[   93.881086]  worker_thread+0x804/0xcf8
[   93.884963]  kthread+0x2a8/0x314
[   93.888303]  ret_from_fork+0x10/0x18

The cdev_device_add/del() API was created to address this issue (see
commit '233ed09d7fda ("chardev: add helper function to register char
devs with a struct device")'), use it instead of cdev add/del().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48760</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix hang in usb_kill_urb by adding memory barriers

The syzbot fuzzer has identified a bug in which processes hang waiting
for usb_kill_urb() to return.  It turns out the issue is not unlinking
the URB; that works just fine.  Rather, the problem arises when the
wakeup notification that the URB has completed is not received.

The reason is memory-access ordering on SMP systems.  In outline form,
usb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on
different CPUs perform the following actions:

CPU 0					CPU 1
----------------------------		---------------------------------
usb_kill_urb():				__usb_hcd_giveback_urb():
  ...					  ...
  atomic_inc(&amp;urb-&gt;reject);		  atomic_dec(&amp;urb-&gt;use_count);
  ...					  ...
  wait_event(usb_kill_urb_queue,
	atomic_read(&amp;urb-&gt;use_count) == 0);
					  if (atomic_read(&amp;urb-&gt;reject))
						wake_up(&amp;usb_kill_urb_queue);

Confining your attention to urb-&gt;reject and urb-&gt;use_count, you can
see that the overall pattern of accesses on CPU 0 is:

	write urb-&gt;reject, then read urb-&gt;use_count;

whereas the overall pattern of accesses on CPU 1 is:

	write urb-&gt;use_count, then read urb-&gt;reject.

This pattern is referred to in memory-model circles as SB (for "Store
Buffering"), and it is well known that without suitable enforcement of
the desired order of accesses -- in the form of memory barriers -- it
is entirely possible for one or both CPUs to execute their reads ahead
of their writes.  The end result will be that sometimes CPU 0 sees the
old un-decremented value of urb-&gt;use_count while CPU 1 sees the old
un-incremented value of urb-&gt;reject.  Consequently CPU 0 ends up on
the wait queue and never gets woken up, leading to the observed hang
in usb_kill_urb().

The same pattern of accesses occurs in usb_poison_urb() and the
failure pathway of usb_hcd_submit_urb().

The problem is fixed by adding suitable memory barriers.  To provide
proper memory-access ordering in the SB pattern, a full barrier is
required on both CPUs.  The atomic_inc() and atomic_dec() accesses
themselves don't provide any memory ordering, but since they are
present, we can use the optimized smp_mb__after_atomic() memory
barrier in the various routines to obtain the desired effect.

This patch adds the necessary memory barriers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48761</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48761" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci-plat: fix crash when suspend if remote wake enable

Crashed at i.mx8qm platform when suspend if enable remote wakeup

Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP
Modules linked in:
CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12
Hardware name: Freescale i.MX8QM MEK (DT)
Workqueue: events_unbound async_run_entry_fn
pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8
lr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8
sp : ffff80001394bbf0
x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578
x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000
x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001
x20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0
x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453
x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c
x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620
Call trace:
 xhci_disable_hub_port_wake.isra.62+0x60/0xf8
 xhci_suspend+0x58/0x510
 xhci_plat_suspend+0x50/0x78
 platform_pm_suspend+0x2c/0x78
 dpm_run_callback.isra.25+0x50/0xe8
 __device_suspend+0x108/0x3c0

The basic flow:
	1. run time suspend call xhci_suspend, xhci parent devices gate the clock.
        2. echo mem &gt;/sys/power/state, system _device_suspend call xhci_suspend
        3. xhci_suspend call xhci_disable_hub_port_wake, which access register,
	   but clock already gated by run time suspend.

This problem was hidden by power domain driver, which call run time resume before it.

But the below commit remove it and make this issue happen.
	commit c1df456d0f06e ("PM: domains: Don't runtime resume devices at genpd_prepare()")

This patch call run time resume before suspend to make sure clock is on
before access register.

Testeb-by: Abel Vesa &lt;abel.vesa@nxp.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48763</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48763" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Forcibly leave nested virt when SMM state is toggled

Forcibly leave nested virtualization operation if userspace toggles SMM
state via KVM_SET_VCPU_EVENTS or KVM_SYNC_X86_EVENTS.  If userspace
forces the vCPU out of SMM while it's post-VMXON and then injects an SMI,
vmx_enter_smm() will overwrite vmx-&gt;nested.smm.vmxon and end up with both
vmxon=false and smm.vmxon=false, but all other nVMX state allocated.

Don't attempt to gracefully handle the transition as (a) most transitions
are nonsencial, e.g. forcing SMM while L2 is running, (b) there isn't
sufficient information to handle all transitions, e.g. SVM wants access
to the SMRAM save state, and (c) KVM_SET_VCPU_EVENTS must precede
KVM_SET_NESTED_STATE during state restore as the latter disallows putting
the vCPU into L2 if SMM is active, and disallows tagging the vCPU as
being post-VMXON in SMM if SMM is not active.

Abuse of KVM_SET_VCPU_EVENTS manifests as a WARN and memory leak in nVMX
due to failure to free vmcs01's shadow VMCS, but the bug goes far beyond
just a memory leak, e.g. toggling SMM on while L2 is active puts the vCPU
in an architecturally impossible state.

  WARNING: CPU: 0 PID: 3606 at free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2665 [inline]
  WARNING: CPU: 0 PID: 3606 at free_loaded_vmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656
  Modules linked in:
  CPU: 1 PID: 3606 Comm: syz-executor725 Not tainted 5.17.0-rc1-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2665 [inline]
  RIP: 0010:free_loaded_vmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656
  Code: &lt;0f&gt; 0b eb b3 e8 8f 4d 9f 00 e9 f7 fe ff ff 48 89 df e8 92 4d 9f 00
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_vcpu_destroy+0x72/0x2f0 arch/x86/kvm/x86.c:11123
   kvm_vcpu_destroy arch/x86/kvm/../../../virt/kvm/kvm_main.c:441 [inline]
   kvm_destroy_vcpus+0x11f/0x290 arch/x86/kvm/../../../virt/kvm/kvm_main.c:460
   kvm_free_vcpus arch/x86/kvm/x86.c:11564 [inline]
   kvm_arch_destroy_vm+0x2e8/0x470 arch/x86/kvm/x86.c:11676
   kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:1217 [inline]
   kvm_put_kvm+0x4fa/0xb00 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1250
   kvm_vm_release+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1273
   __fput+0x286/0x9f0 fs/file_table.c:311
   task_work_run+0xdd/0x1a0 kernel/task_work.c:164
   exit_task_work include/linux/task_work.h:32 [inline]
   do_exit+0xb29/0x2a30 kernel/exit.c:806
   do_group_exit+0xd2/0x2f0 kernel/exit.c:935
   get_signal+0x4b0/0x28c0 kernel/signal.c:2862
   arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
   handle_signal_work kernel/entry/common.c:148 [inline]
   exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
   exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
   __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
   syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
   do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48765</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: LAPIC: Also cancel preemption timer during SET_LAPIC

The below warning is splatting during guest reboot.

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1931 at arch/x86/kvm/x86.c:10322 kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  CPU: 0 PID: 1931 Comm: qemu-system-x86 Tainted: G          I       5.17.0-rc1+ #5
  RIP: 0010:kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_vcpu_ioctl+0x279/0x710 [kvm]
   __x64_sys_ioctl+0x83/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7fd39797350b

This can be triggered by not exposing tsc-deadline mode and doing a reboot in
the guest. The lapic_shutdown() function which is called in sys_reboot path
will not disarm the flying timer, it just masks LVTT. lapic_shutdown() clears
APIC state w/ LVT_MASKED and timer-mode bit is 0, this can trigger timer-mode
switch between tsc-deadline and oneshot/periodic, which can result in preemption
timer be cancelled in apic_update_lvtt(). However, We can't depend on this when
not exposing tsc-deadline mode and oneshot/periodic modes emulated by preemption
timer. Qemu will synchronise states around reset, let's cancel preemption timer
under KVM_SET_LAPIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48766" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48766" ref_url="https://www.suse.com/security/cve/CVE-2022-48766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.

Mirrors the logic for dcn30. Cue lots of WARNs and some
kernel panics without this fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48766/">CVE-2022-48766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48766">CVE-2022-48766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226704">SUSE bug 1226704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48767</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48767" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: properly put ceph_string reference after async create attempt

The reference acquired by try_prep_async_create is currently leaked.
Ensure we put it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48768</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48768" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/histogram: Fix a potential memory leak for kstrdup()

kfree() is missing on an error path to free the memory allocated by
kstrdup():

  p = param = kstrdup(data-&gt;params[i], GFP_KERNEL);

So it is better to free it via kfree(p).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48769</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48769" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: runtime: avoid EFIv2 runtime services on Apple x86 machines

Aditya reports [0] that his recent MacbookPro crashes in the firmware
when using the variable services at runtime. The culprit appears to be a
call to QueryVariableInfo(), which we did not use to call on Apple x86
machines in the past as they only upgraded from EFI v1.10 to EFI v2.40
firmware fairly recently, and QueryVariableInfo() (along with
UpdateCapsule() et al) was added in EFI v2.00.

The only runtime service introduced in EFI v2.00 that we actually use in
Linux is QueryVariableInfo(), as the capsule based ones are optional,
generally not used at runtime (all the LVFS/fwupd firmware update
infrastructure uses helper EFI programs that invoke capsule update at
boot time, not runtime), and not implemented by Apple machines in the
first place. QueryVariableInfo() is used to 'safely' set variables,
i.e., only when there is enough space. This prevents machines with buggy
firmwares from corrupting their NVRAMs when they run out of space.

Given that Apple machines have been using EFI v1.10 services only for
the longest time (the EFI v2.0 spec was released in 2006, and Linux
support for the newly introduced runtime services was added in 2011, but
the MacbookPro12,1 released in 2015 still claims to be EFI v1.10 only),
let's avoid the EFI v2.0 ones on all Apple x86 machines.

[0] https://lore.kernel.org/all/6D757C75-65B1-468B-842D-10410081A8E4@live.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48770</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48770" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48770" ref_url="https://www.suse.com/security/cve/CVE-2022-48770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()

task_pt_regs() can return NULL on powerpc for kernel threads. This is
then used in __bpf_get_stack() to check for user mode, resulting in a
kernel oops. Guard against this by checking return value of
task_pt_regs() before trying to obtain the call chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48770/">CVE-2022-48770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48770">CVE-2022-48770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226730">SUSE bug 1226730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48771</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48771" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix stale file descriptors on failed usercopy

A failing usercopy of the fence_rep object will lead to a stale entry in
the file descriptor table as put_unused_fd() won't release it. This
enables userland to refer to a dangling 'file' object through that still
valid file descriptor, leading to all kinds of use-after-free
exploitation scenarios.

Fix this by deferring the call to fd_install() until after the usercopy
has succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226732">SUSE bug 1226732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: lgdt3306a: Add a check against null-pointer-def

The driver should check whether the client provides the platform_data.

The following log reveals it:

[   29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40
[   29.610730] Read of size 40 at addr 0000000000000000 by task bash/414
[   29.612820] Call Trace:
[   29.613030]  &lt;TASK&gt;
[   29.613201]  dump_stack_lvl+0x56/0x6f
[   29.613496]  ? kmemdup+0x30/0x40
[   29.613754]  print_report.cold+0x494/0x6b7
[   29.614082]  ? kmemdup+0x30/0x40
[   29.614340]  kasan_report+0x8a/0x190
[   29.614628]  ? kmemdup+0x30/0x40
[   29.614888]  kasan_check_range+0x14d/0x1d0
[   29.615213]  memcpy+0x20/0x60
[   29.615454]  kmemdup+0x30/0x40
[   29.615700]  lgdt3306a_probe+0x52/0x310
[   29.616339]  i2c_device_probe+0x951/0xa90
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226976">SUSE bug 1226976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48773</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48773" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create

If there are failures then we must not leave the non-NULL pointers with
the error value, otherwise `rpcrdma_ep_destroy` gets confused and tries
free them, resulting in an Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48774</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48774" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ptdma: Fix the error handling path in pt_core_init()

In order to free resources correctly in the error handling path of
pt_core_init(), 2 goto's have to be switched. Otherwise, some resources
will leak and we will try to release things that have not been allocated
yet.

Also move a dev_err() to a place where it is more meaningful.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add():

   If this function returns an error, kobject_put() must be called to
   properly clean up the memory associated with the object.

Fix memory leak by calling kobject_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48776</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48776" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: parsers: qcom: Fix missing free for pparts in cleanup

Mtdpart doesn't free pparts when a cleanup function is declared.
Add missing free for pparts in cleanup function for smem to fix the
leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48777</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48777" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: parsers: qcom: Fix kernel panic on skipped partition

In the event of a skipped partition (case when the entry name is empty)
the kernel panics in the cleanup function as the name entry is NULL.
Rework the parser logic by first checking the real partition number and
then allocate the space and set the data for the valid partitions.

The logic was also fundamentally wrong as with a skipped partition, the
parts number returned was incorrect by not decreasing it for the skipped
partitions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48778</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: gpmi: don't leak PM reference in error path

If gpmi_nfc_apply_timings() fails, the PM runtime usage counter must be
dropped.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48780</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48780" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Avoid overwriting the copies of clcsock callback functions

The callback functions of clcsock will be saved and replaced during
the fallback. But if the fallback happens more than once, then the
copies of these callback functions will be overwritten incorrectly,
resulting in a loop call issue:

clcsk-&gt;sk_error_report
 |- smc_fback_error_report() &lt;------------------------------|
     |- smc_fback_forward_wakeup()                          | (loop)
         |- clcsock_callback()  (incorrectly overwritten)   |
             |- smc-&gt;clcsk_error_report() ------------------|

So this patch fixes the issue by saving these function pointers only
once in the fallback and avoiding overwriting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48783</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48783" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: lantiq_gswip: fix use after free in gswip_remove()

of_node_put(priv-&gt;ds-&gt;slave_mii_bus-&gt;dev.of_node) should be
done before mdiobus_free(priv-&gt;ds-&gt;slave_mii_bus).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48784</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48784" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: fix race in netlink owner interface destruction

My previous fix here to fix the deadlock left a race where
the exact same deadlock (see the original commit referenced
below) can still happen if cfg80211_destroy_ifaces() already
runs while nl80211_netlink_notify() is still marking some
interfaces as nl_owner_dead.

The race happens because we have two loops here - first we
dev_close() all the netdevs, and then we destroy them. If we
also have two netdevs (first one need only be a wdev though)
then we can find one during the first iteration, close it,
and go to the second iteration -- but then find two, and try
to destroy also the one we didn't close yet.

Fix this by only iterating once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48785</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48785" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48785" ref_url="https://www.suse.com/security/cve/CVE-2022-48785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()

Some time ago 8965779d2c0e ("ipv6,mcast: always hold idev-&gt;lock before mca_lock")
switched ipv6_get_lladdr() to __ipv6_get_lladdr(), which is rcu-unsafe
version. That was OK, because idev-&gt;lock was held for these codepaths.

In 88e2ca308094 ("mld: convert ifmcaddr6 to RCU") these external locks were
removed, so we probably need to restore the original rcu-safe call.

Otherwise, we occasionally get a machine crashed/stalled with the following
in dmesg:

[ 3405.966610][T230589] general protection fault, probably for non-canonical address 0xdead00000000008c: 0000 [#1] SMP NOPTI
[ 3405.982083][T230589] CPU: 44 PID: 230589 Comm: kworker/44:3 Tainted: G           O      5.15.19-cloudflare-2022.2.1 #1
[ 3405.998061][T230589] Hardware name: SUPA-COOL-SERV
[ 3406.009552][T230589] Workqueue: mld mld_ifc_work
[ 3406.017224][T230589] RIP: 0010:__ipv6_get_lladdr+0x34/0x60
[ 3406.025780][T230589] Code: 57 10 48 83 c7 08 48 89 e5 48 39 d7 74 3e 48 8d 82 38 ff ff ff eb 13 48 8b 90 d0 00 00 00 48 8d 82 38 ff ff ff 48 39 d7 74 22 &lt;66&gt; 83 78 32 20 77 1b 75 e4 89 ca 23 50 2c 75 dd 48 8b 50 08 48 8b
[ 3406.055748][T230589] RSP: 0018:ffff94e4b3fc3d10 EFLAGS: 00010202
[ 3406.065617][T230589] RAX: dead00000000005a RBX: ffff94e4b3fc3d30 RCX: 0000000000000040
[ 3406.077477][T230589] RDX: dead000000000122 RSI: ffff94e4b3fc3d30 RDI: ffff8c3a31431008
[ 3406.089389][T230589] RBP: ffff94e4b3fc3d10 R08: 0000000000000000 R09: 0000000000000000
[ 3406.101445][T230589] R10: ffff8c3a31430000 R11: 000000000000000b R12: ffff8c2c37887100
[ 3406.113553][T230589] R13: ffff8c3a39537000 R14: 00000000000005dc R15: ffff8c3a31431000
[ 3406.125730][T230589] FS:  0000000000000000(0000) GS:ffff8c3b9fc80000(0000) knlGS:0000000000000000
[ 3406.138992][T230589] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3406.149895][T230589] CR2: 00007f0dfea1db60 CR3: 000000387b5f2000 CR4: 0000000000350ee0
[ 3406.162421][T230589] Call Trace:
[ 3406.170235][T230589]  &lt;TASK&gt;
[ 3406.177736][T230589]  mld_newpack+0xfe/0x1a0
[ 3406.186686][T230589]  add_grhead+0x87/0xa0
[ 3406.195498][T230589]  add_grec+0x485/0x4e0
[ 3406.204310][T230589]  ? newidle_balance+0x126/0x3f0
[ 3406.214024][T230589]  mld_ifc_work+0x15d/0x450
[ 3406.223279][T230589]  process_one_work+0x1e6/0x380
[ 3406.232982][T230589]  worker_thread+0x50/0x3a0
[ 3406.242371][T230589]  ? rescuer_thread+0x360/0x360
[ 3406.252175][T230589]  kthread+0x127/0x150
[ 3406.261197][T230589]  ? set_kthread_struct+0x40/0x40
[ 3406.271287][T230589]  ret_from_fork+0x22/0x30
[ 3406.280812][T230589]  &lt;/TASK&gt;
[ 3406.288937][T230589] Modules linked in: ... [last unloaded: kheaders]
[ 3406.476714][T230589] ---[ end trace 3525a7655f2f3b9e ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48785/">CVE-2022-48785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48785">CVE-2022-48785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227927">SUSE bug 1227927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48786</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: remove vsock from connected table when connect is interrupted by a signal

vsock_connect() expects that the socket could already be in the
TCP_ESTABLISHED state when the connecting task wakes up with a signal
pending. If this happens the socket will be in the connected table, and
it is not removed when the socket state is reset. In this situation it's
common for the process to retry connect(), and if the connection is
successful the socket will be added to the connected table a second
time, corrupting the list.

Prevent this by calling vsock_remove_connected() if a signal is received
while waiting for a connection. This is harmless if the socket is not in
the connected table, and if it is in the table then removing it will
prevent list corruption from a double add.

Note for backporting: this patch requires d5afa82c977e ("vsock: correct
removal of socket from the list"), which is in all current stable trees
except 4.9.y.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48787</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48787" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: fix use-after-free

If no firmware was present at all (or, presumably, all of the
firmware files failed to parse), we end up unbinding by calling
device_release_driver(), which calls remove(), which then in
iwlwifi calls iwl_drv_stop(), freeing the 'drv' struct. However
the new code I added will still erroneously access it after it
was freed.

Set 'failure=false' in this case to avoid the access, all data
was already freed anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48788" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: fix possible use-after-free in transport error_recovery work

While nvme_rdma_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48789</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48789" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix possible use-after-free in transport error_recovery work

While nvme_tcp_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48790</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48790" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix a possible use-after-free in controller reset during load

Unlike .queue_rq, in .submit_async_event drivers may not check the ctrl
readiness for AER submission. This may lead to a use-after-free
condition that was observed with nvme-tcp.

The race condition may happen in the following scenario:
1. driver executes its reset_ctrl_work
2. -&gt; nvme_stop_ctrl - flushes ctrl async_event_work
3. ctrl sends AEN which is received by the host, which in turn
   schedules AEN handling
4. teardown admin queue (which releases the queue socket)
5. AEN processed, submits another AER, calling the driver to submit
6. driver attempts to send the cmd
==&gt; use-after-free

In order to fix that, add ctrl state check to validate the ctrl
is actually able to accept the AER submission.

This addresses the above race in controller resets because the driver
during teardown should:
1. change ctrl state to RESETTING
2. flush async_event_work (as well as other async work elements)

So after 1,2, any other AER command will find the
ctrl state to be RESETTING and bail out without submitting the AER.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48791</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3304-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix use-after-free for aborted TMF sas_task

Currently a use-after-free may occur if a TMF sas_task is aborted before we
handle the IO completion in mpi_ssp_completion(). The abort occurs due to
timeout.

When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the
sas_task is freed in pm8001_exec_internal_tmf_task().

However, if the I/O completion occurs later, the I/O completion still
thinks that the sas_task is available. Fix this by clearing the ccb-&gt;task
if the TMF times out - the I/O completion handler does nothing if this
pointer is cleared.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228012">SUSE bug 1228012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48792</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task

Currently a use-after-free may occur if a sas_task is aborted by the upper
layer before we handle the I/O completion in mpi_ssp_completion() or
mpi_sata_completion().

In this case, the following are the two steps in handling those I/O
completions:

 - Call complete() to inform the upper layer handler of completion of
   the I/O.

 - Release driver resources associated with the sas_task in
   pm8001_ccb_task_free() call.

When complete() is called, the upper layer may free the sas_task. As such,
we should not touch the associated sas_task afterwards, but we do so in the
pm8001_ccb_task_free() call.

Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228017">SUSE bug 1228017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48793</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48793" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: nSVM: fix potential NULL derefernce on nested migration

Turns out that due to review feedback and/or rebases
I accidentally moved the call to nested_svm_load_cr3 to be too early,
before the NPT is enabled, which is very wrong to do.

KVM can't even access guest memory at that point as nested NPT
is needed for that, and of course it won't initialize the walk_mmu,
which is main issue the patch was addressing.

Fix this for real.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48794</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: at86rf230: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. In the Tx case we then leak
the skb structure.

Free the skb structure upon error before returning when appropriate.

As the 'is_tx = 0' cannot be moved in the complete handler because of a
possible race between the delay in switching to STATE_RX_AACK_ON and a
new interrupt, we introduce an intermediate 'was_tx' boolean just for
this purpose.

There is no Fixes tag applying here, many changes have been made on this
area and the issue kind of always existed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48796</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48796" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Fix potential use-after-free during probe

Kasan has reported the following use after free on dev-&gt;iommu.
when a device probe fails and it is in process of freeing dev-&gt;iommu
in dev_iommu_free function, a deferred_probe_work_func runs in parallel
and tries to access dev-&gt;iommu-&gt;fwspec in of_iommu_configure path thus
causing use after free.

BUG: KASAN: use-after-free in of_iommu_configure+0xb4/0x4a4
Read of size 8 at addr ffffff87a2f1acb8 by task kworker/u16:2/153

Workqueue: events_unbound deferred_probe_work_func
Call trace:
 dump_backtrace+0x0/0x33c
 show_stack+0x18/0x24
 dump_stack_lvl+0x16c/0x1e0
 print_address_description+0x84/0x39c
 __kasan_report+0x184/0x308
 kasan_report+0x50/0x78
 __asan_load8+0xc0/0xc4
 of_iommu_configure+0xb4/0x4a4
 of_dma_configure_id+0x2fc/0x4d4
 platform_dma_configure+0x40/0x5c
 really_probe+0x1b4/0xb74
 driver_probe_device+0x11c/0x228
 __device_attach_driver+0x14c/0x304
 bus_for_each_drv+0x124/0x1b0
 __device_attach+0x25c/0x334
 device_initial_probe+0x24/0x34
 bus_probe_device+0x78/0x134
 deferred_probe_work_func+0x130/0x1a8
 process_one_work+0x4c8/0x970
 worker_thread+0x5c8/0xaec
 kthread+0x1f8/0x220
 ret_from_fork+0x10/0x18

Allocated by task 1:
 ____kasan_kmalloc+0xd4/0x114
 __kasan_kmalloc+0x10/0x1c
 kmem_cache_alloc_trace+0xe4/0x3d4
 __iommu_probe_device+0x90/0x394
 probe_iommu_group+0x70/0x9c
 bus_for_each_dev+0x11c/0x19c
 bus_iommu_probe+0xb8/0x7d4
 bus_set_iommu+0xcc/0x13c
 arm_smmu_bus_init+0x44/0x130 [arm_smmu]
 arm_smmu_device_probe+0xb88/0xc54 [arm_smmu]
 platform_drv_probe+0xe4/0x13c
 really_probe+0x2c8/0xb74
 driver_probe_device+0x11c/0x228
 device_driver_attach+0xf0/0x16c
 __driver_attach+0x80/0x320
 bus_for_each_dev+0x11c/0x19c
 driver_attach+0x38/0x48
 bus_add_driver+0x1dc/0x3a4
 driver_register+0x18c/0x244
 __platform_driver_register+0x88/0x9c
 init_module+0x64/0xff4 [arm_smmu]
 do_one_initcall+0x17c/0x2f0
 do_init_module+0xe8/0x378
 load_module+0x3f80/0x4a40
 __se_sys_finit_module+0x1a0/0x1e4
 __arm64_sys_finit_module+0x44/0x58
 el0_svc_common+0x100/0x264
 do_el0_svc+0x38/0xa4
 el0_svc+0x20/0x30
 el0_sync_handler+0x68/0xac
 el0_sync+0x160/0x180

Freed by task 1:
 kasan_set_track+0x4c/0x84
 kasan_set_free_info+0x28/0x4c
 ____kasan_slab_free+0x120/0x15c
 __kasan_slab_free+0x18/0x28
 slab_free_freelist_hook+0x204/0x2fc
 kfree+0xfc/0x3a4
 __iommu_probe_device+0x284/0x394
 probe_iommu_group+0x70/0x9c
 bus_for_each_dev+0x11c/0x19c
 bus_iommu_probe+0xb8/0x7d4
 bus_set_iommu+0xcc/0x13c
 arm_smmu_bus_init+0x44/0x130 [arm_smmu]
 arm_smmu_device_probe+0xb88/0xc54 [arm_smmu]
 platform_drv_probe+0xe4/0x13c
 really_probe+0x2c8/0xb74
 driver_probe_device+0x11c/0x228
 device_driver_attach+0xf0/0x16c
 __driver_attach+0x80/0x320
 bus_for_each_dev+0x11c/0x19c
 driver_attach+0x38/0x48
 bus_add_driver+0x1dc/0x3a4
 driver_register+0x18c/0x244
 __platform_driver_register+0x88/0x9c
 init_module+0x64/0xff4 [arm_smmu]
 do_one_initcall+0x17c/0x2f0
 do_init_module+0xe8/0x378
 load_module+0x3f80/0x4a40
 __se_sys_finit_module+0x1a0/0x1e4
 __arm64_sys_finit_module+0x44/0x58
 el0_svc_common+0x100/0x264
 do_el0_svc+0x38/0xa4
 el0_svc+0x20/0x30
 el0_sync_handler+0x68/0xac
 el0_sync+0x160/0x180

Fix this by setting dev-&gt;iommu to NULL first and
then freeing dev_iommu structure in dev_iommu_free
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48797</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48797" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: don't try to NUMA-migrate COW pages that have other uses

Oded Gabbay reports that enabling NUMA balancing causes corruption with
his Gaudi accelerator test load:

 "All the details are in the bug, but the bottom line is that somehow,
  this patch causes corruption when the numa balancing feature is
  enabled AND we don't use process affinity AND we use GUP to pin pages
  so our accelerator can DMA to/from system memory.

  Either disabling numa balancing, using process affinity to bind to
  specific numa-node or reverting this patch causes the bug to
  disappear"

and Oded bisected the issue to commit 09854ba94c6a ("mm: do_wp_page()
simplification").

Now, the NUMA balancing shouldn't actually be changing the writability
of a page, and as such shouldn't matter for COW.  But it appears it
does.  Suspicious.

However, regardless of that, the condition for enabling NUMA faults in
change_pte_range() is nonsensical.  It uses "page_mapcount(page)" to
decide if a COW page should be NUMA-protected or not, and that makes
absolutely no sense.

The number of mappings a page has is irrelevant: not only does GUP get a
reference to a page as in Oded's case, but the other mappings migth be
paged out and the only reference to them would be in the page count.

Since we should never try to NUMA-balance a page that we can't move
anyway due to other references, just fix the code to use 'page_count()'.
Oded confirms that that fixes his issue.

Now, this does imply that something in NUMA balancing ends up changing
page protections (other than the obvious one of making the page
inaccessible to get the NUMA faulting information).  Otherwise the COW
simplification wouldn't matter - since doing the GUP on the page would
make sure it's writable.

The cause of that permission change would be good to figure out too,
since it clearly results in spurious COW events - but fixing the
nonsensical test that just happened to work before is obviously the
CorrectThing(tm) to do regardless.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48798" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cio: verify the driver availability for path_event call

If no driver is attached to a device or the driver does not provide the
path_event function, an FCES path-event on this device could end up in a
kernel-panic. Verify the driver availability before the path_event
function call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48799</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix list corruption in perf_cgroup_switch()

There's list corruption on cgrp_cpuctx_list. This happens on the
following path:

  perf_cgroup_switch: list_for_each_entry(cgrp_cpuctx_list)
      cpu_ctx_sched_in
         ctx_sched_in
            ctx_pinned_sched_in
              merge_sched_in
                  perf_cgroup_event_disable: remove the event from the list

Use list_for_each_entry_safe() to allow removing an entry during
iteration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48800</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48800" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: vmscan: remove deadlock due to throttling failing to make progress

A soft lockup bug in kcompactd was reported in a private bugzilla with
the following visible in dmesg;

  watchdog: BUG: soft lockup - CPU#33 stuck for 26s! [kcompactd0:479]
  watchdog: BUG: soft lockup - CPU#33 stuck for 52s! [kcompactd0:479]
  watchdog: BUG: soft lockup - CPU#33 stuck for 78s! [kcompactd0:479]
  watchdog: BUG: soft lockup - CPU#33 stuck for 104s! [kcompactd0:479]

The machine had 256G of RAM with no swap and an earlier failed
allocation indicated that node 0 where kcompactd was run was potentially
unreclaimable;

  Node 0 active_anon:29355112kB inactive_anon:2913528kB active_file:0kB
    inactive_file:0kB unevictable:64kB isolated(anon):0kB isolated(file):0kB
    mapped:8kB dirty:0kB writeback:0kB shmem:26780kB shmem_thp:
    0kB shmem_pmdmapped: 0kB anon_thp: 23480320kB writeback_tmp:0kB
    kernel_stack:2272kB pagetables:24500kB all_unreclaimable? yes

Vlastimil Babka investigated a crash dump and found that a task
migrating pages was trying to drain PCP lists;

  PID: 52922  TASK: ffff969f820e5000  CPU: 19  COMMAND: "kworker/u128:3"
  Call Trace:
     __schedule
     schedule
     schedule_timeout
     wait_for_completion
     __flush_work
     __drain_all_pages
     __alloc_pages_slowpath.constprop.114
     __alloc_pages
     alloc_migration_target
     migrate_pages
     migrate_to_node
     do_migrate_pages
     cpuset_migrate_mm_workfn
     process_one_work
     worker_thread
     kthread
     ret_from_fork

This failure is specific to CONFIG_PREEMPT=n builds.  The root of the
problem is that kcompact0 is not rescheduling on a CPU while a task that
has isolated a large number of the pages from the LRU is waiting on
kcompact0 to reschedule so the pages can be released.  While
shrink_inactive_list() only loops once around too_many_isolated, reclaim
can continue without rescheduling if sc-&gt;skipped_deactivate == 1 which
could happen if there was no file LRU and the inactive anon list was not
low.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48801</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48801" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL

If we fail to copy the just created file descriptor to userland, we
try to clean up by putting back 'fd' and freeing 'ib'. The code uses
put_unused_fd() for the former which is wrong, as the file descriptor
was already published by fd_install() which gets called internally by
anon_inode_getfd().

This makes the error handling code leaving a half cleaned up file
descriptor table around and a partially destructed 'file' object,
allowing userland to play use-after-free tricks on us, by abusing
the still usable fd and making the code operate on a dangling
'file-&gt;private_data' pointer.

Instead of leaving the kernel in a partially corrupted state, don't
attempt to explicitly clean up and leave this to the process exit
path that'll release any still valid fds, including the one created
by the previous call to anon_inode_getfd(). Simply return -EFAULT to
indicate the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228023">SUSE bug 1228023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48802</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48802" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: task_mmu.c: don't read mapcount for migration entry

The syzbot reported the below BUG:

  kernel BUG at include/linux/page-flags.h:785!
  invalid opcode: 0000 [#1] PREEMPT SMP KASAN
  CPU: 1 PID: 4392 Comm: syz-executor560 Not tainted 5.16.0-rc6-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:PageDoubleMap include/linux/page-flags.h:785 [inline]
  RIP: 0010:__page_mapcount+0x2d2/0x350 mm/util.c:744
  Call Trace:
    page_mapcount include/linux/mm.h:837 [inline]
    smaps_account+0x470/0xb10 fs/proc/task_mmu.c:466
    smaps_pte_entry fs/proc/task_mmu.c:538 [inline]
    smaps_pte_range+0x611/0x1250 fs/proc/task_mmu.c:601
    walk_pmd_range mm/pagewalk.c:128 [inline]
    walk_pud_range mm/pagewalk.c:205 [inline]
    walk_p4d_range mm/pagewalk.c:240 [inline]
    walk_pgd_range mm/pagewalk.c:277 [inline]
    __walk_page_range+0xe23/0x1ea0 mm/pagewalk.c:379
    walk_page_vma+0x277/0x350 mm/pagewalk.c:530
    smap_gather_stats.part.0+0x148/0x260 fs/proc/task_mmu.c:768
    smap_gather_stats fs/proc/task_mmu.c:741 [inline]
    show_smap+0xc6/0x440 fs/proc/task_mmu.c:822
    seq_read_iter+0xbb0/0x1240 fs/seq_file.c:272
    seq_read+0x3e0/0x5b0 fs/seq_file.c:162
    vfs_read+0x1b5/0x600 fs/read_write.c:479
    ksys_read+0x12d/0x250 fs/read_write.c:619
    do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    entry_SYSCALL_64_after_hwframe+0x44/0xae

The reproducer was trying to read /proc/$PID/smaps when calling
MADV_FREE at the mean time.  MADV_FREE may split THPs if it is called
for partial THP.  It may trigger the below race:

           CPU A                         CPU B
           -----                         -----
  smaps walk:                      MADV_FREE:
  page_mapcount()
    PageCompound()
                                   split_huge_page()
    page = compound_head(page)
    PageDoubleMap(page)

When calling PageDoubleMap() this page is not a tail page of THP anymore
so the BUG is triggered.

This could be fixed by elevated refcount of the page before calling
mapcount, but that would prevent it from counting migration entries, and
it seems overkilling because the race just could happen when PMD is
split so all PTE entries of tail pages are actually migration entries,
and smaps_account() does treat migration entries as mapcount == 1 as
Kirill pointed out.

Add a new parameter for smaps_account() to tell this entry is migration
entry then skip calling page_mapcount().  Don't skip getting mapcount
for device private entries since they do track references with mapcount.

Pagemap also has the similar issue although it was not reported.  Fixed
it as well.

[shy828301@gmail.com: v4]
  Link: https://lkml.kernel.org/r/20220203182641.824731-1-shy828301@gmail.com
[nathan@kernel.org: avoid unused variable warning in pagemap_pmd_range()]
  Link: https://lkml.kernel.org/r/20220207171049.1102239-1-nathan@kernel.org
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48803</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48803" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: ti: Fix missing sentinel for clk_div_table

_get_table_maxdiv() tries to access "clk_div_table" array out of bound
defined in phy-j721e-wiz.c. Add a sentinel entry to prevent
the following global-out-of-bounds error reported by enabling KASAN.

[    9.552392] BUG: KASAN: global-out-of-bounds in _get_maxdiv+0xc0/0x148
[    9.558948] Read of size 4 at addr ffff8000095b25a4 by task kworker/u4:1/38
[    9.565926]
[    9.567441] CPU: 1 PID: 38 Comm: kworker/u4:1 Not tainted 5.16.0-116492-gdaadb3bd0e8d-dirty #360
[    9.576242] Hardware name: Texas Instruments J721e EVM (DT)
[    9.581832] Workqueue: events_unbound deferred_probe_work_func
[    9.587708] Call trace:
[    9.590174]  dump_backtrace+0x20c/0x218
[    9.594038]  show_stack+0x18/0x68
[    9.597375]  dump_stack_lvl+0x9c/0xd8
[    9.601062]  print_address_description.constprop.0+0x78/0x334
[    9.606830]  kasan_report+0x1f0/0x260
[    9.610517]  __asan_load4+0x9c/0xd8
[    9.614030]  _get_maxdiv+0xc0/0x148
[    9.617540]  divider_determine_rate+0x88/0x488
[    9.622005]  divider_round_rate_parent+0xc8/0x124
[    9.626729]  wiz_clk_div_round_rate+0x54/0x68
[    9.631113]  clk_core_determine_round_nolock+0x124/0x158
[    9.636448]  clk_core_round_rate_nolock+0x68/0x138
[    9.641260]  clk_core_set_rate_nolock+0x268/0x3a8
[    9.645987]  clk_set_rate+0x50/0xa8
[    9.649499]  cdns_sierra_phy_init+0x88/0x248
[    9.653794]  phy_init+0x98/0x108
[    9.657046]  cdns_pcie_enable_phy+0xa0/0x170
[    9.661340]  cdns_pcie_init_phy+0x250/0x2b0
[    9.665546]  j721e_pcie_probe+0x4b8/0x798
[    9.669579]  platform_probe+0x8c/0x108
[    9.673350]  really_probe+0x114/0x630
[    9.677037]  __driver_probe_device+0x18c/0x220
[    9.681505]  driver_probe_device+0xac/0x150
[    9.685712]  __device_attach_driver+0xec/0x170
[    9.690178]  bus_for_each_drv+0xf0/0x158
[    9.694124]  __device_attach+0x184/0x210
[    9.698070]  device_initial_probe+0x14/0x20
[    9.702277]  bus_probe_device+0xec/0x100
[    9.706223]  deferred_probe_work_func+0x124/0x180
[    9.710951]  process_one_work+0x4b0/0xbc0
[    9.714983]  worker_thread+0x74/0x5d0
[    9.718668]  kthread+0x214/0x230
[    9.721919]  ret_from_fork+0x10/0x20
[    9.725520]
[    9.727032] The buggy address belongs to the variable:
[    9.732183]  clk_div_table+0x24/0x440
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt_ioctl: fix array_index_nospec in vt_setactivate

array_index_nospec ensures that an out-of-bounds value is set to zero
on the transient path. Decreasing the value by one afterwards causes
a transient integer underflow. vsa.console should be decreased first
and then sanitized with array_index_nospec.

Kasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh
Razavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU
Amsterdam.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48805</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48805" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48805" ref_url="https://www.suse.com/security/cve/CVE-2022-48805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup

ax88179_rx_fixup() contains several out-of-bounds accesses that can be
triggered by a malicious (or defective) USB device, in particular:

 - The metadata array (hdr_off..hdr_off+2*pkt_cnt) can be out of bounds,
   causing OOB reads and (on big-endian systems) OOB endianness flips.
 - A packet can overlap the metadata array, causing a later OOB
   endianness flip to corrupt data used by a cloned SKB that has already
   been handed off into the network stack.
 - A packet SKB can be constructed whose tail is far beyond its end,
   causing out-of-bounds heap data to be considered part of the SKB's
   data.

I have tested that this can be used by a malicious USB device to send a
bogus ICMPv6 Echo Request and receive an ICMPv6 Echo Reply in response
that contains random kernel heap data.
It's probably also possible to get OOB writes from this on a
little-endian system somehow - maybe by triggering skb_cow() via IP
options processing -, but I haven't tested that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48805/">CVE-2022-48805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48805">CVE-2022-48805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227969">SUSE bug 1227969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48806</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48806" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX

Commit effa453168a7 ("i2c: i801: Don't silently correct invalid transfer
size") revealed that ee1004_eeprom_read() did not properly limit how
many bytes to read at once.

In particular, i2c_smbus_read_i2c_block_data_or_emulated() takes the
length to read as an u8.  If count == 256 after taking into account the
offset and page boundary, the cast to u8 overflows.  And this is common
when user space tries to read the entire EEPROM at once.

To fix it, limit each read to I2C_SMBUS_BLOCK_MAX (32) bytes, already
the maximum length i2c_smbus_read_i2c_block_data_or_emulated() allows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48807</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48807" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler

Currently, the same handler is called for both a NETDEV_BONDING_INFO
LAG unlink notification as for a NETDEV_UNREGISTER call.  This is
causing a problem though, since the netdev_notifier_info passed has
a different structure depending on which event is passed.  The problem
manifests as a call trace from a BUG: KASAN stack-out-of-bounds error.

Fix this by creating a handler specific to NETDEV_UNREGISTER that only
is passed valid elements in the netdev_notifier_info struct for the
NETDEV_UNREGISTER event.

Also included is the removal of an unbalanced dev_put on the peer_netdev
and related braces.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228024">SUSE bug 1228024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48808</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48808" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48808" ref_url="https://www.suse.com/security/cve/CVE-2022-48808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: fix panic when DSA master device unbinds on shutdown

Rafael reports that on a system with LX2160A and Marvell DSA switches,
if a reboot occurs while the DSA master (dpaa2-eth) is up, the following
panic can be seen:

systemd-shutdown[1]: Rebooting.
Unable to handle kernel paging request at virtual address 00a0000800000041
[00a0000800000041] address between user and kernel address ranges
Internal error: Oops: 96000004 [#1] PREEMPT SMP
CPU: 6 PID: 1 Comm: systemd-shutdow Not tainted 5.16.5-00042-g8f5585009b24 #32
pc : dsa_slave_netdevice_event+0x130/0x3e4
lr : raw_notifier_call_chain+0x50/0x6c
Call trace:
 dsa_slave_netdevice_event+0x130/0x3e4
 raw_notifier_call_chain+0x50/0x6c
 call_netdevice_notifiers_info+0x54/0xa0
 __dev_close_many+0x50/0x130
 dev_close_many+0x84/0x120
 unregister_netdevice_many+0x130/0x710
 unregister_netdevice_queue+0x8c/0xd0
 unregister_netdev+0x20/0x30
 dpaa2_eth_remove+0x68/0x190
 fsl_mc_driver_remove+0x20/0x5c
 __device_release_driver+0x21c/0x220
 device_release_driver_internal+0xac/0xb0
 device_links_unbind_consumers+0xd4/0x100
 __device_release_driver+0x94/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_device_remove+0x24/0x40
 __fsl_mc_device_remove+0xc/0x20
 device_for_each_child+0x58/0xa0
 dprc_remove+0x90/0xb0
 fsl_mc_driver_remove+0x20/0x5c
 __device_release_driver+0x21c/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_bus_remove+0x80/0x100
 fsl_mc_bus_shutdown+0xc/0x1c
 platform_shutdown+0x20/0x30
 device_shutdown+0x154/0x330
 __do_sys_reboot+0x1cc/0x250
 __arm64_sys_reboot+0x20/0x30
 invoke_syscall.constprop.0+0x4c/0xe0
 do_el0_svc+0x4c/0x150
 el0_svc+0x24/0xb0
 el0t_64_sync_handler+0xa8/0xb0
 el0t_64_sync+0x178/0x17c

It can be seen from the stack trace that the problem is that the
deregistration of the master causes a dev_close(), which gets notified
as NETDEV_GOING_DOWN to dsa_slave_netdevice_event().
But dsa_switch_shutdown() has already run, and this has unregistered the
DSA slave interfaces, and yet, the NETDEV_GOING_DOWN handler attempts to
call dev_close_many() on those slave interfaces, leading to the problem.

The previous attempt to avoid the NETDEV_GOING_DOWN on the master after
dsa_switch_shutdown() was called seems improper. Unregistering the slave
interfaces is unnecessary and unhelpful. Instead, after the slaves have
stopped being uppers of the DSA master, we can now reset to NULL the
master-&gt;dsa_ptr pointer, which will make DSA start ignoring all future
notifier events on the master.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48808/">CVE-2022-48808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48808">CVE-2022-48808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227958">SUSE bug 1227958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48809</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48809" ref_url="https://www.suse.com/security/cve/CVE-2022-48809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix a memleak when uncloning an skb dst and its metadata

When uncloning an skb dst and its associated metadata, a new
dst+metadata is allocated and later replaces the old one in the skb.
This is helpful to have a non-shared dst+metadata attached to a specific
skb.

The issue is the uncloned dst+metadata is initialized with a refcount of
1, which is increased to 2 before attaching it to the skb. When
tun_dst_unclone returns, the dst+metadata is only referenced from a
single place (the skb) while its refcount is 2. Its refcount will never
drop to 0 (when the skb is consumed), leading to a memory leak.

Fix this by removing the call to dst_hold in tun_dst_unclone, as the
dst+metadata refcount is already 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48809/">CVE-2022-48809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48809">CVE-2022-48809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227947">SUSE bug 1227947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48810</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48810" ref_url="https://www.suse.com/security/cve/CVE-2022-48810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path

ip[6]mr_free_table() can only be called under RTNL lock.

RTNL: assertion failed at net/core/dev.c (10367)
WARNING: CPU: 1 PID: 5890 at net/core/dev.c:10367 unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367
Modules linked in:
CPU: 1 PID: 5890 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller-11627-g422ee58dc0ef #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367
Code: 0f 85 9b ee ff ff e8 69 07 4b fa ba 7f 28 00 00 48 c7 c6 00 90 ae 8a 48 c7 c7 40 90 ae 8a c6 05 6d b1 51 06 01 e8 8c 90 d8 01 &lt;0f&gt; 0b e9 70 ee ff ff e8 3e 07 4b fa 4c 89 e7 e8 86 2a 59 fa e9 ee
RSP: 0018:ffffc900046ff6e0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff888050f51d00 RSI: ffffffff815fa008 RDI: fffff520008dfece
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815f3d6e R11: 0000000000000000 R12: 00000000fffffff4
R13: dffffc0000000000 R14: ffffc900046ff750 R15: ffff88807b7dc000
FS:  00007f4ab736e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fee0b4f8990 CR3: 000000001e7d2000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 mroute_clean_tables+0x244/0xb40 net/ipv6/ip6mr.c:1509
 ip6mr_free_table net/ipv6/ip6mr.c:389 [inline]
 ip6mr_rules_init net/ipv6/ip6mr.c:246 [inline]
 ip6mr_net_init net/ipv6/ip6mr.c:1306 [inline]
 ip6mr_net_init+0x3f0/0x4e0 net/ipv6/ip6mr.c:1298
 ops_init+0xaf/0x470 net/core/net_namespace.c:140
 setup_net+0x54f/0xbb0 net/core/net_namespace.c:331
 copy_net_ns+0x318/0x760 net/core/net_namespace.c:475
 create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
 copy_namespaces+0x391/0x450 kernel/nsproxy.c:178
 copy_process+0x2e0c/0x7300 kernel/fork.c:2167
 kernel_clone+0xe7/0xab0 kernel/fork.c:2555
 __do_sys_clone+0xc8/0x110 kernel/fork.c:2672
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f4ab89f9059
Code: Unable to access opcode bytes at RIP 0x7f4ab89f902f.
RSP: 002b:00007f4ab736e118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007f4ab8b0bf60 RCX: 00007f4ab89f9059
RDX: 0000000020000280 RSI: 0000000020000270 RDI: 0000000040200000
RBP: 00007f4ab8a5308d R08: 0000000020000300 R09: 0000000020000300
R10: 00000000200002c0 R11: 0000000000000206 R12: 0000000000000000
R13: 00007ffc3977cc1f R14: 00007f4ab736e300 R15: 0000000000022000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48810/">CVE-2022-48810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48810">CVE-2022-48810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227936">SUSE bug 1227936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48811</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: don't release napi in __ibmvnic_open()

If __ibmvnic_open() encounters an error such as when setting link state,
it calls release_resources() which frees the napi structures needlessly.
Instead, have __ibmvnic_open() only clean up the work it did so far (i.e.
disable napi and irqs) and leave the rest to the callers.

If caller of __ibmvnic_open() is ibmvnic_open(), it should release the
resources immediately. If the caller is do_reset() or do_hard_reset(),
they will release the resources on the next reset.

This fixes following crash that occurred when running the drmgr command
several times to add/remove a vnic interface:

	[102056] ibmvnic 30000003 env3: Disabling rx_scrq[6] irq
	[102056] ibmvnic 30000003 env3: Disabling rx_scrq[7] irq
	[102056] ibmvnic 30000003 env3: Replenished 8 pools
	Kernel attempted to read user page (10) - exploit attempt? (uid: 0)
	BUG: Kernel NULL pointer dereference on read at 0x00000010
	Faulting instruction address: 0xc000000000a3c840
	Oops: Kernel access of bad area, sig: 11 [#1]
	LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
	...
	CPU: 9 PID: 102056 Comm: kworker/9:2 Kdump: loaded Not tainted 5.16.0-rc5-autotest-g6441998e2e37 #1
	Workqueue: events_long __ibmvnic_reset [ibmvnic]
	NIP:  c000000000a3c840 LR: c0080000029b5378 CTR: c000000000a3c820
	REGS: c0000000548e37e0 TRAP: 0300   Not tainted  (5.16.0-rc5-autotest-g6441998e2e37)
	MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 28248484  XER: 00000004
	CFAR: c0080000029bdd24 DAR: 0000000000000010 DSISR: 40000000 IRQMASK: 0
	GPR00: c0080000029b55d0 c0000000548e3a80 c0000000028f0200 0000000000000000
	...
	NIP [c000000000a3c840] napi_enable+0x20/0xc0
	LR [c0080000029b5378] __ibmvnic_open+0xf0/0x430 [ibmvnic]
	Call Trace:
	[c0000000548e3a80] [0000000000000006] 0x6 (unreliable)
	[c0000000548e3ab0] [c0080000029b55d0] __ibmvnic_open+0x348/0x430 [ibmvnic]
	[c0000000548e3b40] [c0080000029bcc28] __ibmvnic_reset+0x500/0xdf0 [ibmvnic]
	[c0000000548e3c60] [c000000000176228] process_one_work+0x288/0x570
	[c0000000548e3d00] [c000000000176588] worker_thread+0x78/0x660
	[c0000000548e3da0] [c0000000001822f0] kthread+0x1c0/0x1d0
	[c0000000548e3e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64
	Instruction dump:
	7d2948f8 792307e0 4e800020 60000000 3c4c01eb 384239e0 f821ffd1 39430010
	38a0fff6 e92d1100 f9210028 39200000 &lt;e9030010&gt; f9010020 60420000 e9210020
	---[ end trace 5f8033b08fd27706 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48812</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48812" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: lantiq_gswip: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The GSWIP switch is a platform device, so the initial set of constraints
that I thought would cause this (I2C or SPI buses which call -&gt;remove on
-&gt;shutdown) do not apply. But there is one more which applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the GSWIP switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The gswip driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48813" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: felix: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The Felix VSC9959 switch is a PCI device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
-&gt;remove on -&gt;shutdown) do not apply. But there is one more which
applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the felix switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The felix driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc_size() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48814" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: seville: register the mdiobus under devres

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The Seville VSC9959 switch is a platform device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
-&gt;remove on -&gt;shutdown) do not apply. But there is one more which
applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the seville switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The seville driver has a code structure that could accommodate both the
mdiobus_unregister and mdiobus_free calls, but it has an external
dependency upon mscc_miim_setup() from mdio-mscc-miim.c, which calls
devm_mdiobus_alloc_size() on its behalf. So rather than restructuring
that, and exporting yet one more symbol mscc_miim_teardown(), let's work
with devres and replace of_mdiobus_register with the devres variant.
When we use all-devres, we can ensure that devres doesn't free a
still-registered bus (it either runs both callbacks, or none).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48815</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48815" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: bcm_sf2: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The Starfighter 2 is a platform device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
-&gt;remove on -&gt;shutdown) do not apply. But there is one more which
applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the bcm_sf2 switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The bcm_sf2 driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: lock against -&gt;sock changing during sysfs read

-&gt;sock can be set to NULL asynchronously unless -&gt;recv_mutex is held.
So it is important to hold that mutex.  Otherwise a sysfs read can
trigger an oops.
Commit 17f09d3f619a ("SUNRPC: Check if the xprt is connected before
handling sysfs reads") appears to attempt to fix this problem, but it
only narrows the race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48817" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: ar9331: register the mdiobus under devres

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The ar9331 is an MDIO device, so the initial set of constraints that I
thought would cause this (I2C or SPI buses which call -&gt;remove on
-&gt;shutdown) do not apply. But there is one more which applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the ar9331 switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The ar9331 driver doesn't have a complex code structure for mdiobus
removal, so just replace of_mdiobus_register with the devres variant in
order to be all-devres and ensure that we don't free a still-registered
bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48818</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48818" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The mv88e6xxx is an MDIO device, so the initial set of constraints that
I thought would cause this (I2C or SPI buses which call -&gt;remove on
-&gt;shutdown) do not apply. But there is one more which applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the Marvell switch driver on shutdown.

systemd-shutdown[1]: Powering off.
mv88e6085 0x0000000008b96000:00 sw_gl0: Link is Down
fsl-mc dpbp.9: Removing from iommu group 7
fsl-mc dpbp.8: Removing from iommu group 7
------------[ cut here ]------------
kernel BUG at drivers/net/phy/mdio_bus.c:677!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 1 Comm: systemd-shutdow Not tainted 5.16.5-00040-gdc05f73788e5 #15
pc : mdiobus_free+0x44/0x50
lr : devm_mdiobus_free+0x10/0x20
Call trace:
 mdiobus_free+0x44/0x50
 devm_mdiobus_free+0x10/0x20
 devres_release_all+0xa0/0x100
 __device_release_driver+0x190/0x220
 device_release_driver_internal+0xac/0xb0
 device_links_unbind_consumers+0xd4/0x100
 __device_release_driver+0x4c/0x220
 device_release_driver_internal+0xac/0xb0
 device_links_unbind_consumers+0xd4/0x100
 __device_release_driver+0x94/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_device_remove+0x24/0x40
 __fsl_mc_device_remove+0xc/0x20
 device_for_each_child+0x58/0xa0
 dprc_remove+0x90/0xb0
 fsl_mc_driver_remove+0x20/0x5c
 __device_release_driver+0x21c/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_bus_remove+0x80/0x100
 fsl_mc_bus_shutdown+0xc/0x1c
 platform_shutdown+0x20/0x30
 device_shutdown+0x154/0x330
 kernel_power_off+0x34/0x6c
 __do_sys_reboot+0x15c/0x250
 __arm64_sys_reboot+0x20/0x30
 invoke_syscall.constprop.0+0x4c/0xe0
 do_el0_svc+0x4c/0x150
 el0_svc+0x24/0xb0
 el0t_64_sync_handler+0xa8/0xb0
 el0t_64_sync+0x178/0x17c

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The Marvell driver already has a good structure for mdiobus removal, so
just plug in mdiobus_free and get rid of devres.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48820</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48820" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()

This error path needs to decrement "usbphyc-&gt;n_pll_cons.counter" before
returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48821" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: avoid double fput() on failed usercopy

If the copy back to userland fails for the FASTRPC_IOCTL_ALLOC_DMA_BUFF
ioctl(), we shouldn't assume that 'buf-&gt;dmabuf' is still valid. In fact,
dma_buf_fd() called fd_install() before, i.e. "consumed" one reference,
leaving us with none.

Calling dma_buf_put() will therefore put a reference we no longer own,
leading to a valid file descritor table entry for an already released
'file' object which is a straight use-after-free.

Simply avoid calling dma_buf_put() and rely on the process exit code to
do the necessary cleanup, if needed, i.e. if the file descriptor is
still valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228022">SUSE bug 1228022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48822</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: f_fs: Fix use-after-free for epfile

Consider a case where ffs_func_eps_disable is called from
ffs_func_disable as part of composition switch and at the
same time ffs_epfile_release get called from userspace.
ffs_epfile_release will free up the read buffer and call
ffs_data_closed which in turn destroys ffs-&gt;epfiles and
mark it as NULL. While this was happening the driver has
already initialized the local epfile in ffs_func_eps_disable
which is now freed and waiting to acquire the spinlock. Once
spinlock is acquired the driver proceeds with the stale value
of epfile and tries to free the already freed read buffer
causing use-after-free.

Following is the illustration of the race:

      CPU1                                  CPU2

   ffs_func_eps_disable
   epfiles (local copy)
					ffs_epfile_release
					ffs_data_closed
					if (last file closed)
					ffs_data_reset
					ffs_data_clear
					ffs_epfiles_destroy
spin_lock
dereference epfiles

Fix this races by taking epfiles local copy &amp; assigning it under
spinlock and if epfiles(local) is null then update it in ffs-&gt;epfiles
then finally destroy it.
Extending the scope further from the race, protecting the ep related
structures, and concurrent accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228136">SUSE bug 1228136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48823</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix refcount issue when LOGO is received during TMF

Hung task call trace was seen during LOGO processing.

[  974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued...
[  974.309065] [0000:00:00.0]:[qedf_initiate_tmf:2422]: tm_flags 0x10 sc_cmd 00000000c16b930f op = 0x2a target_id = 0x2 lun=0
[  974.309178] [0000:00:00.0]:[qedf_initiate_tmf:2431]: portid=016900 tm_flags =LUN RESET
[  974.309222] [0000:00:00.0]:[qedf_initiate_tmf:2438]: orig io_req = 00000000ec78df8f xid = 0x180 ref_cnt = 1.
[  974.309625] host1: rport 016900: Received LOGO request while in state Ready
[  974.309627] host1: rport 016900: Delete port
[  974.309642] host1: rport 016900: work event 3
[  974.309644] host1: rport 016900: lld callback ev 3
[  974.313243] [0000:61:00.2]:[qedf_execute_tmf:2383]:1: fcport is uploading, not executing flush.
[  974.313295] [0000:61:00.2]:[qedf_execute_tmf:2400]:1: task mgmt command success...
[  984.031088] INFO: task jbd2/dm-15-8:7645 blocked for more than 120 seconds.
[  984.031136]       Not tainted 4.18.0-305.el8.x86_64 #1

[  984.031166] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  984.031209] jbd2/dm-15-8    D    0  7645      2 0x80004080
[  984.031212] Call Trace:
[  984.031222]  __schedule+0x2c4/0x700
[  984.031230]  ? unfreeze_partials.isra.83+0x16e/0x1a0
[  984.031233]  ? bit_wait_timeout+0x90/0x90
[  984.031235]  schedule+0x38/0xa0
[  984.031238]  io_schedule+0x12/0x40
[  984.031240]  bit_wait_io+0xd/0x50
[  984.031243]  __wait_on_bit+0x6c/0x80
[  984.031248]  ? free_buffer_head+0x21/0x50
[  984.031251]  out_of_line_wait_on_bit+0x91/0xb0
[  984.031257]  ? init_wait_var_entry+0x50/0x50
[  984.031268]  jbd2_journal_commit_transaction+0x112e/0x19f0 [jbd2]
[  984.031280]  kjournald2+0xbd/0x270 [jbd2]
[  984.031284]  ? finish_wait+0x80/0x80
[  984.031291]  ? commit_timeout+0x10/0x10 [jbd2]
[  984.031294]  kthread+0x116/0x130
[  984.031300]  ? kthread_flush_work_fn+0x10/0x10
[  984.031305]  ret_from_fork+0x1f/0x40

There was a ref count issue when LOGO is received during TMF. This leads to
one of the I/Os hanging with the driver. Fix the ref count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48824</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: myrs: Fix crash in error case

In myrs_detect(), cs-&gt;disable_intr is NULL when privdata-&gt;hw_init() fails
with non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and
crash the kernel.

[    1.105606] myrs 0000:00:03.0: Unknown Initialization Error 5A
[    1.105872] myrs 0000:00:03.0: Failed to initialize Controller
[    1.106082] BUG: kernel NULL pointer dereference, address: 0000000000000000
[    1.110774] Call Trace:
[    1.110950]  myrs_cleanup+0xe4/0x150 [myrs]
[    1.111135]  myrs_probe.cold+0x91/0x56a [myrs]
[    1.111302]  ? DAC960_GEM_intr_handler+0x1f0/0x1f0 [myrs]
[    1.111500]  local_pci_probe+0x48/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48825</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Add stag_work to all the vports

Call trace seen when creating NPIV ports, only 32 out of 64 show online.
stag work was not initialized for vport, hence initialize the stag work.

WARNING: CPU: 8 PID: 645 at kernel/workqueue.c:1635 __queue_delayed_work+0x68/0x80
CPU: 8 PID: 645 Comm: kworker/8:1 Kdump: loaded Tainted: G IOE    --------- --
 4.18.0-348.el8.x86_64 #1
Hardware name: Dell Inc. PowerEdge MX740c/0177V9, BIOS 2.12.2 07/09/2021
Workqueue: events fc_lport_timeout [libfc]
RIP: 0010:__queue_delayed_work+0x68/0x80
Code: 89 b2 88 00 00 00 44 89 82 90 00 00 00 48 01 c8 48 89 42 50 41 81
f8 00 20 00 00 75 1d e9 60 24 07 00 44 89 c7 e9 98 f6 ff ff &lt;0f&gt; 0b eb
c5 0f 0b eb a1 0f 0b eb a7 0f 0b eb ac 44 89 c6 e9 40 23
RSP: 0018:ffffae514bc3be40 EFLAGS: 00010006
RAX: ffff8d25d6143750 RBX: 0000000000000202 RCX: 0000000000000002
RDX: ffff8d2e31383748 RSI: ffff8d25c000d600 RDI: ffff8d2e31383788
RBP: ffff8d2e31380de0 R08: 0000000000002000 R09: ffff8d2e31383750
R10: ffffffffc0c957e0 R11: ffff8d2624800000 R12: ffff8d2e31380a58
R13: ffff8d2d915eb000 R14: ffff8d25c499b5c0 R15: ffff8d2e31380e18
FS:  0000000000000000(0000) GS:ffff8d2d1fb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055fd0484b8b8 CR3: 00000008ffc10006 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
  queue_delayed_work_on+0x36/0x40
  qedf_elsct_send+0x57/0x60 [qedf]
  fc_lport_enter_flogi+0x90/0xc0 [libfc]
  fc_lport_timeout+0xb7/0x140 [libfc]
  process_one_work+0x1a7/0x360
  ? create_worker+0x1a0/0x1a0
  worker_thread+0x30/0x390
  ? create_worker+0x1a0/0x1a0
  kthread+0x116/0x130
  ? kthread_flush_work_fn+0x10/0x10
  ret_from_fork+0x35/0x40
 ---[ end trace 008f00f722f2c2ff ]--

Initialize stag work for all the vports.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48826</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Fix deadlock on DSI device attach error

DSI device attach to DSI host will be done with host device's lock
held.

Un-registering host in "device attach" error path (ex: probe retry)
will result in deadlock with below call trace and non operational
DSI display.

Startup Call trace:
[   35.043036]  rt_mutex_slowlock.constprop.21+0x184/0x1b8
[   35.043048]  mutex_lock_nested+0x7c/0xc8
[   35.043060]  device_del+0x4c/0x3e8
[   35.043075]  device_unregister+0x20/0x40
[   35.043082]  mipi_dsi_remove_device_fn+0x18/0x28
[   35.043093]  device_for_each_child+0x68/0xb0
[   35.043105]  mipi_dsi_host_unregister+0x40/0x90
[   35.043115]  vc4_dsi_host_attach+0xf0/0x120 [vc4]
[   35.043199]  mipi_dsi_attach+0x30/0x48
[   35.043209]  tc358762_probe+0x128/0x164 [tc358762]
[   35.043225]  mipi_dsi_drv_probe+0x28/0x38
[   35.043234]  really_probe+0xc0/0x318
[   35.043244]  __driver_probe_device+0x80/0xe8
[   35.043254]  driver_probe_device+0xb8/0x118
[   35.043263]  __device_attach_driver+0x98/0xe8
[   35.043273]  bus_for_each_drv+0x84/0xd8
[   35.043281]  __device_attach+0xf0/0x150
[   35.043290]  device_initial_probe+0x1c/0x28
[   35.043300]  bus_probe_device+0xa4/0xb0
[   35.043308]  deferred_probe_work_func+0xa0/0xe0
[   35.043318]  process_one_work+0x254/0x700
[   35.043330]  worker_thread+0x4c/0x448
[   35.043339]  kthread+0x19c/0x1a8
[   35.043348]  ret_from_fork+0x10/0x20

Shutdown Call trace:
[  365.565417] Call trace:
[  365.565423]  __switch_to+0x148/0x200
[  365.565452]  __schedule+0x340/0x9c8
[  365.565467]  schedule+0x48/0x110
[  365.565479]  schedule_timeout+0x3b0/0x448
[  365.565496]  wait_for_completion+0xac/0x138
[  365.565509]  __flush_work+0x218/0x4e0
[  365.565523]  flush_work+0x1c/0x28
[  365.565536]  wait_for_device_probe+0x68/0x158
[  365.565550]  device_shutdown+0x24/0x348
[  365.565561]  kernel_restart_prepare+0x40/0x50
[  365.565578]  kernel_restart+0x20/0x70
[  365.565591]  __do_sys_reboot+0x10c/0x220
[  365.565605]  __arm64_sys_reboot+0x2c/0x38
[  365.565619]  invoke_syscall+0x4c/0x110
[  365.565634]  el0_svc_common.constprop.3+0xfc/0x120
[  365.565648]  do_el0_svc+0x2c/0x90
[  365.565661]  el0_svc+0x4c/0xf0
[  365.565671]  el0t_64_sync_handler+0x90/0xb8
[  365.565682]  el0t_64_sync+0x180/0x184
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48827</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix the behavior of READ near OFFSET_MAX

Dan Aloni reports:
&gt; Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to
&gt; the RPC read layers") on the client, a read of 0xfff is aligned up
&gt; to server rsize of 0x1000.
&gt;
&gt; As a result, in a test where the server has a file of size
&gt; 0x7fffffffffffffff, and the client tries to read from the offset
&gt; 0x7ffffffffffff000, the read causes loff_t overflow in the server
&gt; and it returns an NFS code of EINVAL to the client. The client as
&gt; a result indefinitely retries the request.

The Linux NFS client does not handle NFS?ERR_INVAL, even though all
NFS specifications permit servers to return that status code for a
READ.

Instead of NFS?ERR_INVAL, have out-of-range READ requests succeed
and return a short result. Set the EOF flag in the result to prevent
the client from retrying the READ request. This behavior appears to
be consistent with Solaris NFS servers.

Note that NFSv3 and NFSv4 use u64 offset values on the wire. These
must be converted to loff_t internally before use -- an implicit
type cast is not adequate for this purpose. Otherwise VFS checks
against sb-&gt;s_maxbytes do not work properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix ia_size underflow

iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and
NFSv4 both define file size as an unsigned 64-bit type. Thus there
is a range of valid file size values an NFS client can send that is
already larger than Linux can handle.

Currently decode_fattr4() dumps a full u64 value into ia_size. If
that value happens to be larger than S64_MAX, then ia_size
underflows. I'm about to fix up the NFSv3 behavior as well, so let's
catch the underflow in the common code path: nfsd_setattr().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes

iattr::ia_size is a loff_t, so these NFSv3 procedures must be
careful to deal with incoming client size values that are larger
than s64_max without corrupting the value.

Silently capping the value results in storing a different value
than the client passed in which is unexpected behavior, so remove
the min_t() check in decode_sattr3().

Note that RFC 1813 permits only the WRITE procedure to return
NFS3ERR_FBIG. We believe that NFSv3 reference implementations
also return NFS3ERR_FBIG when ia_size is too large.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: fix potential CAN frame reception race in isotp_rcv()

When receiving a CAN frame the current code logic does not consider
concurrently receiving processes which do not show up in real world
usage.

Ziyang Xuan writes:

The following syz problem is one of the scenarios. so-&gt;rx.len is
changed by isotp_rcv_ff() during isotp_rcv_cf(), so-&gt;rx.len equals
0 before alloc_skb() and equals 4096 after alloc_skb(). That will
trigger skb_over_panic() in skb_put().

=======================================================
CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc8-syzkaller #0
RIP: 0010:skb_panic+0x16c/0x16e net/core/skbuff.c:113
Call Trace:
 &lt;TASK&gt;
 skb_over_panic net/core/skbuff.c:118 [inline]
 skb_put.cold+0x24/0x24 net/core/skbuff.c:1990
 isotp_rcv_cf net/can/isotp.c:570 [inline]
 isotp_rcv+0xa38/0x1e30 net/can/isotp.c:668
 deliver net/can/af_can.c:574 [inline]
 can_rcv_filter+0x445/0x8d0 net/can/af_can.c:635
 can_receive+0x31d/0x580 net/can/af_can.c:665
 can_rcv+0x120/0x1c0 net/can/af_can.c:696
 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5465
 __netif_receive_skb+0x24/0x1b0 net/core/dev.c:5579

Therefore we make sure the state changes and data structures stay
consistent at CAN frame reception time by adding a spin_lock in
isotp_rcv(). This fixes the issue reported by syzkaller but does not
affect real world operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48831</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48831" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: fix reference leak in asymmetric_verify()

Don't leak a reference to the key if its algorithm is unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48834" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: usbtmc: Fix bug in pipe direction for control transfers

The syzbot fuzzer reported a minor bug in the usbtmc driver:

usb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0
WARNING: CPU: 0 PID: 3813 at drivers/usb/core/urb.c:412
usb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410
Modules linked in:
CPU: 0 PID: 3813 Comm: syz-executor122 Not tainted
5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0
...
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58
 usb_internal_control_msg drivers/usb/core/message.c:102 [inline]
 usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153
 usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [inline]

The problem is that usbtmc_ioctl_request() uses usb_rcvctrlpipe() for
all of its transfers, whether they are in or out.  It's easy to fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48835" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Page fault in reply q processing

A page fault was encountered in mpt3sas on a LUN reset error path:

[  145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) smid(3) msix_index(0)
[  145.778932] scsi 1:0:0:0: task abort: FAILED scmd(0x0000000024ba29a2)
[  145.817307] scsi 1:0:0:0: attempting device reset! scmd(0x0000000024ba29a2)
[  145.827253] scsi 1:0:0:0: [sg1] tag#2 CDB: Receive Diagnostic 1c 01 01 ff fc 00
[  145.837617] scsi target1:0:0: handle(0x0002), sas_address(0x500605b0000272b9), phy(0)
[  145.848598] scsi target1:0:0: enclosure logical id(0x500605b0000272b8), slot(0)
[  149.858378] mpt3sas_cm1: Poll ReplyDescriptor queues for completion of smid(0), task_type(0x05), handle(0x0002)
[  149.875202] BUG: unable to handle page fault for address: 00000007fffc445d
[  149.885617] #PF: supervisor read access in kernel mode
[  149.894346] #PF: error_code(0x0000) - not-present page
[  149.903123] PGD 0 P4D 0
[  149.909387] Oops: 0000 [#1] PREEMPT SMP NOPTI
[  149.917417] CPU: 24 PID: 3512 Comm: scsi_eh_1 Kdump: loaded Tainted: G S         O      5.10.89-altav-1 #1
[  149.934327] Hardware name: DDN           200NVX2             /200NVX2-MB          , BIOS ATHG2.2.02.01 09/10/2021
[  149.951871] RIP: 0010:_base_process_reply_queue+0x4b/0x900 [mpt3sas]
[  149.961889] Code: 0f 84 22 02 00 00 8d 48 01 49 89 fd 48 8d 57 38 f0 0f b1 4f 38 0f 85 d8 01 00 00 49 8b 45 10 45 31 e4 41 8b 55 0c 48 8d 1c d0 &lt;0f&gt; b6 03 83 e0 0f 3c 0f 0f 85 a2 00 00 00 e9 e6 01 00 00 0f b7 ee
[  149.991952] RSP: 0018:ffffc9000f1ebcb8 EFLAGS: 00010246
[  150.000937] RAX: 0000000000000055 RBX: 00000007fffc445d RCX: 000000002548f071
[  150.011841] RDX: 00000000ffff8881 RSI: 0000000000000001 RDI: ffff888125ed50d8
[  150.022670] RBP: 0000000000000000 R08: 0000000000000000 R09: c0000000ffff7fff
[  150.033445] R10: ffffc9000f1ebb68 R11: ffffc9000f1ebb60 R12: 0000000000000000
[  150.044204] R13: ffff888125ed50d8 R14: 0000000000000080 R15: 34cdc00034cdea80
[  150.054963] FS:  0000000000000000(0000) GS:ffff88dfaf200000(0000) knlGS:0000000000000000
[  150.066715] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.076078] CR2: 00000007fffc445d CR3: 000000012448a006 CR4: 0000000000770ee0
[  150.086887] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  150.097670] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  150.108323] PKRU: 55555554
[  150.114690] Call Trace:
[  150.120497]  ? printk+0x48/0x4a
[  150.127049]  mpt3sas_scsih_issue_tm.cold.114+0x2e/0x2b3 [mpt3sas]
[  150.136453]  mpt3sas_scsih_issue_locked_tm+0x86/0xb0 [mpt3sas]
[  150.145759]  scsih_dev_reset+0xea/0x300 [mpt3sas]
[  150.153891]  scsi_eh_ready_devs+0x541/0x9e0 [scsi_mod]
[  150.162206]  ? __scsi_host_match+0x20/0x20 [scsi_mod]
[  150.170406]  ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
[  150.178925]  ? blk_mq_tagset_busy_iter+0x45/0x60
[  150.186638]  ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
[  150.195087]  scsi_error_handler+0x3a5/0x4a0 [scsi_mod]
[  150.203206]  ? __schedule+0x1e9/0x610
[  150.209783]  ? scsi_eh_get_sense+0x210/0x210 [scsi_mod]
[  150.217924]  kthread+0x12e/0x150
[  150.224041]  ? kthread_worker_fn+0x130/0x130
[  150.231206]  ret_from_fork+0x1f/0x30

This is caused by mpt3sas_base_sync_reply_irqs() using an invalid reply_q
pointer outside of the list_for_each_entry() loop. At the end of the full
list traversal the pointer is invalid.

Move the _base_process_reply_queue() call inside of the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48836</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: aiptek - properly check endpoint type

Syzbot reported warning in usb_submit_urb() which is caused by wrong
endpoint type. There was a check for the number of endpoints, but not
for the type of endpoint.

Fix it by replacing old desc.bNumEndpoints check with
usb_find_common_endpoints() helper for finding endpoints

Fail log:

usb 5-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
Modules linked in:
CPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Workqueue: usb_hub_wq hub_event
...
Call Trace:
 &lt;TASK&gt;
 aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830
 input_open_device+0x1bb/0x320 drivers/input/input.c:629
 kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48837</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: rndis: prevent integer overflow in rndis_set_response()

If "BufOffset" is very large the "BufOffset + 8" operation can have an
integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48838" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: Fix use-after-free bug by not setting udc-&gt;dev.driver

The syzbot fuzzer found a use-after-free bug:

BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320
Read of size 8 at addr ffff88802b934098 by task udevd/3689

CPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 dev_uevent+0x712/0x780 drivers/base/core.c:2320
 uevent_show+0x1b8/0x380 drivers/base/core.c:2391
 dev_attr_show+0x4b/0x90 drivers/base/core.c:2094

Although the bug manifested in the driver core, the real cause was a
race with the gadget core.  dev_uevent() does:

	if (dev-&gt;driver)
		add_uevent_var(env, "DRIVER=%s", dev-&gt;driver-&gt;name);

and between the test and the dereference of dev-&gt;driver, the gadget
core sets dev-&gt;driver to NULL.

The race wouldn't occur if the gadget core registered its devices on
a real bus, using the standard synchronization techniques of the
driver core.  However, it's not necessary to make such a large change
in order to fix this bug; all we need to do is make sure that
udc-&gt;dev.driver is always NULL.

In fact, there is no reason for udc-&gt;dev.driver ever to be set to
anything, let alone to the value it currently gets: the address of the
gadget's driver.  After all, a gadget driver only knows how to manage
a gadget, not how to manage a UDC.

This patch simply removes the statements in the gadget core that touch
udc-&gt;dev.driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48839</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48839" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix slab-out-of-bounds access in packet_recvmsg()

syzbot found that when an AF_PACKET socket is using PACKET_COPY_THRESH
and mmap operations, tpacket_rcv() is queueing skbs with
garbage in skb-&gt;cb[], triggering a too big copy [1]

Presumably, users of af_packet using mmap() already gets correct
metadata from the mapped buffer, we can simply make sure
to clear 12 bytes that might be copied to user space later.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:225 [inline]
BUG: KASAN: stack-out-of-bounds in packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489
Write of size 165 at addr ffffc9000385fb78 by task syz-executor233/3631

CPU: 0 PID: 3631 Comm: syz-executor233 Not tainted 5.17.0-rc7-syzkaller-02396-g0b3660695e80 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0xf/0x336 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x13d/0x180 mm/kasan/generic.c:189
 memcpy+0x39/0x60 mm/kasan/shadow.c:66
 memcpy include/linux/fortify-string.h:225 [inline]
 packet_recvmsg+0x56c/0x1150 net/packet/af_packet.c:3489
 sock_recvmsg_nosec net/socket.c:948 [inline]
 sock_recvmsg net/socket.c:966 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 ____sys_recvmsg+0x2c4/0x600 net/socket.c:2632
 ___sys_recvmsg+0x127/0x200 net/socket.c:2674
 __sys_recvmsg+0xe2/0x1a0 net/socket.c:2704
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fdfd5954c29
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 41 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcf8e71e48 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fdfd5954c29
RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000005
RBP: 0000000000000000 R08: 000000000000000d R09: 000000000000000d
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffcf8e71e60
R13: 00000000000f4240 R14: 000000000000c1ff R15: 00007ffcf8e71e54
 &lt;/TASK&gt;

addr ffffc9000385fb78 is located in stack of task syz-executor233/3631 at offset 32 in frame:
 ____sys_recvmsg+0x0/0x600 include/linux/uio.h:246

this frame has 1 object:
 [32, 160) 'addr'

Memory state around the buggy address:
 ffffc9000385fa80: 00 04 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00
 ffffc9000385fb00: 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00
&gt;ffffc9000385fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3
                                                                ^
 ffffc9000385fc00: f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
 ffffc9000385fc80: f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 00 00 00 00 00
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48840" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix hang during reboot/shutdown

Recent commit 974578017fc1 ("iavf: Add waiting so the port is
initialized in remove") adds a wait-loop at the beginning of
iavf_remove() to ensure that port initialization is finished
prior unregistering net device. This causes a regression
in reboot/shutdown scenario because in this case callback
iavf_shutdown() is called and this callback detaches the device,
makes it down if it is running and sets its state to __IAVF_REMOVE.
Later shutdown callback of associated PF driver (e.g. ice_shutdown)
is called. That callback calls among other things sriov_disable()
that calls indirectly iavf_remove() (see stack trace below).
As the adapter state is already __IAVF_REMOVE then the mentioned
loop is end-less and shutdown process hangs.

The patch fixes this by checking adapter's state at the beginning
of iavf_remove() and skips the rest of the function if the adapter
is already in remove state (shutdown is in progress).

Reproducer:
1. Create VF on PF driven by ice or i40e driver
2. Ensure that the VF is bound to iavf driver
3. Reboot

[52625.981294] sysrq: SysRq : Show Blocked State
[52625.988377] task:reboot          state:D stack:    0 pid:17359 ppid:     1 f2
[52625.996732] Call Trace:
[52625.999187]  __schedule+0x2d1/0x830
[52626.007400]  schedule+0x35/0xa0
[52626.010545]  schedule_hrtimeout_range_clock+0x83/0x100
[52626.020046]  usleep_range+0x5b/0x80
[52626.023540]  iavf_remove+0x63/0x5b0 [iavf]
[52626.027645]  pci_device_remove+0x3b/0xc0
[52626.031572]  device_release_driver_internal+0x103/0x1f0
[52626.036805]  pci_stop_bus_device+0x72/0xa0
[52626.040904]  pci_stop_and_remove_bus_device+0xe/0x20
[52626.045870]  pci_iov_remove_virtfn+0xba/0x120
[52626.050232]  sriov_disable+0x2f/0xe0
[52626.053813]  ice_free_vfs+0x7c/0x340 [ice]
[52626.057946]  ice_remove+0x220/0x240 [ice]
[52626.061967]  ice_shutdown+0x16/0x50 [ice]
[52626.065987]  pci_device_shutdown+0x34/0x60
[52626.070086]  device_shutdown+0x165/0x1c5
[52626.074011]  kernel_restart+0xe/0x30
[52626.077593]  __do_sys_reboot+0x1d2/0x210
[52626.093815]  do_syscall_64+0x5b/0x1a0
[52626.097483]  entry_SYSCALL_64_after_hwframe+0x65/0xca
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48841" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats()

It is possible to do NULL pointer dereference in routine that updates
Tx ring stats. Currently only stats and bytes are updated when ring
pointer is valid, but later on ring is accessed to propagate gathered Tx
stats onto VSI stats.

Change the existing logic to move to next ring when ring is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48842" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix race condition during interface enslave

Commit 5dbbbd01cbba83 ("ice: Avoid RTNL lock when re-creating
auxiliary device") changes a process of re-creation of aux device
so ice_plug_aux_dev() is called from ice_service_task() context.
This unfortunately opens a race window that can result in dead-lock
when interface has left LAG and immediately enters LAG again.

Reproducer:
```
#!/bin/sh

ip link add lag0 type bond mode 1 miimon 100
ip link set lag0

for n in {1..10}; do
        echo Cycle: $n
        ip link set ens7f0 master lag0
        sleep 1
        ip link set ens7f0 nomaster
done
```

This results in:
[20976.208697] Workqueue: ice ice_service_task [ice]
[20976.213422] Call Trace:
[20976.215871]  __schedule+0x2d1/0x830
[20976.219364]  schedule+0x35/0xa0
[20976.222510]  schedule_preempt_disabled+0xa/0x10
[20976.227043]  __mutex_lock.isra.7+0x310/0x420
[20976.235071]  enum_all_gids_of_dev_cb+0x1c/0x100 [ib_core]
[20976.251215]  ib_enum_roce_netdev+0xa4/0xe0 [ib_core]
[20976.256192]  ib_cache_setup_one+0x33/0xa0 [ib_core]
[20976.261079]  ib_register_device+0x40d/0x580 [ib_core]
[20976.266139]  irdma_ib_register_device+0x129/0x250 [irdma]
[20976.281409]  irdma_probe+0x2c1/0x360 [irdma]
[20976.285691]  auxiliary_bus_probe+0x45/0x70
[20976.289790]  really_probe+0x1f2/0x480
[20976.298509]  driver_probe_device+0x49/0xc0
[20976.302609]  bus_for_each_drv+0x79/0xc0
[20976.306448]  __device_attach+0xdc/0x160
[20976.310286]  bus_probe_device+0x9d/0xb0
[20976.314128]  device_add+0x43c/0x890
[20976.321287]  __auxiliary_device_add+0x43/0x60
[20976.325644]  ice_plug_aux_dev+0xb2/0x100 [ice]
[20976.330109]  ice_service_task+0xd0c/0xed0 [ice]
[20976.342591]  process_one_work+0x1a7/0x360
[20976.350536]  worker_thread+0x30/0x390
[20976.358128]  kthread+0x10a/0x120
[20976.365547]  ret_from_fork+0x1f/0x40
...
[20976.438030] task:ip              state:D stack:    0 pid:213658 ppid:213627 flags:0x00004084
[20976.446469] Call Trace:
[20976.448921]  __schedule+0x2d1/0x830
[20976.452414]  schedule+0x35/0xa0
[20976.455559]  schedule_preempt_disabled+0xa/0x10
[20976.460090]  __mutex_lock.isra.7+0x310/0x420
[20976.464364]  device_del+0x36/0x3c0
[20976.467772]  ice_unplug_aux_dev+0x1a/0x40 [ice]
[20976.472313]  ice_lag_event_handler+0x2a2/0x520 [ice]
[20976.477288]  notifier_call_chain+0x47/0x70
[20976.481386]  __netdev_upper_dev_link+0x18b/0x280
[20976.489845]  bond_enslave+0xe05/0x1790 [bonding]
[20976.494475]  do_setlink+0x336/0xf50
[20976.502517]  __rtnl_newlink+0x529/0x8b0
[20976.543441]  rtnl_newlink+0x43/0x60
[20976.546934]  rtnetlink_rcv_msg+0x2b1/0x360
[20976.559238]  netlink_rcv_skb+0x4c/0x120
[20976.563079]  netlink_unicast+0x196/0x230
[20976.567005]  netlink_sendmsg+0x204/0x3d0
[20976.570930]  sock_sendmsg+0x4c/0x50
[20976.574423]  ____sys_sendmsg+0x1eb/0x250
[20976.586807]  ___sys_sendmsg+0x7c/0xc0
[20976.606353]  __sys_sendmsg+0x57/0xa0
[20976.609930]  do_syscall_64+0x5b/0x1a0
[20976.613598]  entry_SYSCALL_64_after_hwframe+0x65/0xca

1. Command 'ip link ... set nomaster' causes that ice_plug_aux_dev()
   is called from ice_service_task() context, aux device is created
   and associated device-&gt;lock is taken.
2. Command 'ip link ... set master...' calls ice's notifier under
   RTNL lock and that notifier calls ice_unplug_aux_dev(). That
   function tries to take aux device-&gt;lock but this is already taken
   by ice_plug_aux_dev() in step 1
3. Later ice_plug_aux_dev() tries to take RTNL lock but this is already
   taken in step 2
4. Dead-lock

The patch fixes this issue by following changes:
- Bit ICE_FLAG_PLUG_AUX_DEV is kept to be set during ice_plug_aux_dev()
  call in ice_service_task()
- The bit is checked in ice_clear_rdma_cap() and only if it is not set
  then ice_unplug_aux_dev() is called. If it is set (in other words
  plugging of aux device was requested and ice_plug_aux_dev() is
  potentially running) then the function only clears the
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48843</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48843" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vrr: Set VRR capable prop only if it is attached to connector

VRR capable property is not attached by default to the connector
It is attached only if VRR is supported.
So if the driver tries to call drm core set prop function without
it being attached that causes NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48844</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48844" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48844" ref_url="https://www.suse.com/security/cve/CVE-2022-48844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix leaking sent_cmd skb

sent_cmd memory is not freed before freeing hci_dev causing it to leak
it contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48844/">CVE-2022-48844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48844">CVE-2022-48844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228068">SUSE bug 1228068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48846</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48846" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48846" ref_url="https://www.suse.com/security/cve/CVE-2022-48846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: release rq qos structures for queue without disk

blkcg_init_queue() may add rq qos structures to request queue, previously
blk_cleanup_queue() calls rq_qos_exit() to release them, but commit
8e141f9eb803 ("block: drain file system I/O on del_gendisk")
moves rq_qos_exit() into del_gendisk(), so memory leak is caused
because queues may not have disk, such as un-present scsi luns, nvme
admin queue, ...

Fixes the issue by adding rq_qos_exit() to blk_cleanup_queue() back.

BTW, v5.18 won't need this patch any more since we move
blkcg_init_queue()/blkcg_exit_queue() into disk allocation/release
handler, and patches have been in for-5.18/block.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48846/">CVE-2022-48846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48846">CVE-2022-48846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227992">SUSE bug 1227992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48847</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48847" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watch_queue: Fix filter limit check

In watch_queue_set_filter(), there are a couple of places where we check
that the filter type value does not exceed what the type_filter bitmap
can hold.  One place calculates the number of bits by:

   if (tf[i].type &gt;= sizeof(wfilter-&gt;type_filter) * 8)

which is fine, but the second does:

   if (tf[i].type &gt;= sizeof(wfilter-&gt;type_filter) * BITS_PER_LONG)

which is not.  This can lead to a couple of out-of-bounds writes due to
a too-large type:

 (1) __set_bit() on wfilter-&gt;type_filter
 (2) Writing more elements in wfilter-&gt;filters[] than we allocated.

Fix this by just using the proper WATCH_TYPE__NR instead, which is the
number of types we actually know about.

The bug may cause an oops looking something like:

  BUG: KASAN: slab-out-of-bounds in watch_queue_set_filter+0x659/0x740
  Write of size 4 at addr ffff88800d2c66bc by task watch_queue_oob/611
  ...
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x45/0x59
   print_address_description.constprop.0+0x1f/0x150
   ...
   kasan_report.cold+0x7f/0x11b
   ...
   watch_queue_set_filter+0x659/0x740
   ...
   __x64_sys_ioctl+0x127/0x190
   do_syscall_64+0x43/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  Allocated by task 611:
   kasan_save_stack+0x1e/0x40
   __kasan_kmalloc+0x81/0xa0
   watch_queue_set_filter+0x23a/0x740
   __x64_sys_ioctl+0x127/0x190
   do_syscall_64+0x43/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  The buggy address belongs to the object at ffff88800d2c66a0
   which belongs to the cache kmalloc-32 of size 32
  The buggy address is located 28 bytes inside of
   32-byte region [ffff88800d2c66a0, ffff88800d2c66c0)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48849" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: bypass tiling flag check in virtual display case (v2)

vkms leverages common amdgpu framebuffer creation, and
also as it does not support FB modifier, there is no need
to check tiling flags when initing framebuffer when virtual
display is enabled.

This can fix below calltrace:

amdgpu 0000:00:08.0: GFX9+ requires FB check based on format modifier
WARNING: CPU: 0 PID: 1023 at drivers/gpu/drm/amd/amdgpu/amdgpu_display.c:1150 amdgpu_display_framebuffer_init+0x8e7/0xb40 [amdgpu]

v2: check adev-&gt;enable_virtual_display instead as vkms can be
	enabled in bare metal as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48850</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48850" ref_url="https://www.suse.com/security/cve/CVE-2022-48850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net-sysfs: add check for netdevice being present to speed_show

When bringing down the netdevice or system shutdown, a panic can be
triggered while accessing the sysfs path because the device is already
removed.

    [  755.549084] mlx5_core 0000:12:00.1: Shutdown was called
    [  756.404455] mlx5_core 0000:12:00.0: Shutdown was called
    ...
    [  757.937260] BUG: unable to handle kernel NULL pointer dereference at           (null)
    [  758.031397] IP: [&lt;ffffffff8ee11acb&gt;] dma_pool_alloc+0x1ab/0x280

    crash&gt; bt
    ...
    PID: 12649  TASK: ffff8924108f2100  CPU: 1   COMMAND: "amsd"
    ...
     #9 [ffff89240e1a38b0] page_fault at ffffffff8f38c778
        [exception RIP: dma_pool_alloc+0x1ab]
        RIP: ffffffff8ee11acb  RSP: ffff89240e1a3968  RFLAGS: 00010046
        RAX: 0000000000000246  RBX: ffff89243d874100  RCX: 0000000000001000
        RDX: 0000000000000000  RSI: 0000000000000246  RDI: ffff89243d874090
        RBP: ffff89240e1a39c0   R8: 000000000001f080   R9: ffff8905ffc03c00
        R10: ffffffffc04680d4  R11: ffffffff8edde9fd  R12: 00000000000080d0
        R13: ffff89243d874090  R14: ffff89243d874080  R15: 0000000000000000
        ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
    #10 [ffff89240e1a39c8] mlx5_alloc_cmd_msg at ffffffffc04680f3 [mlx5_core]
    #11 [ffff89240e1a3a18] cmd_exec at ffffffffc046ad62 [mlx5_core]
    #12 [ffff89240e1a3ab8] mlx5_cmd_exec at ffffffffc046b4fb [mlx5_core]
    #13 [ffff89240e1a3ae8] mlx5_core_access_reg at ffffffffc0475434 [mlx5_core]
    #14 [ffff89240e1a3b40] mlx5e_get_fec_caps at ffffffffc04a7348 [mlx5_core]
    #15 [ffff89240e1a3bb0] get_fec_supported_advertised at ffffffffc04992bf [mlx5_core]
    #16 [ffff89240e1a3c08] mlx5e_get_link_ksettings at ffffffffc049ab36 [mlx5_core]
    #17 [ffff89240e1a3ce8] __ethtool_get_link_ksettings at ffffffff8f25db46
    #18 [ffff89240e1a3d48] speed_show at ffffffff8f277208
    #19 [ffff89240e1a3dd8] dev_attr_show at ffffffff8f0b70e3
    #20 [ffff89240e1a3df8] sysfs_kf_seq_show at ffffffff8eedbedf
    #21 [ffff89240e1a3e18] kernfs_seq_show at ffffffff8eeda596
    #22 [ffff89240e1a3e28] seq_read at ffffffff8ee76d10
    #23 [ffff89240e1a3e98] kernfs_fop_read at ffffffff8eedaef5
    #24 [ffff89240e1a3ed8] vfs_read at ffffffff8ee4e3ff
    #25 [ffff89240e1a3f08] sys_read at ffffffff8ee4f27f
    #26 [ffff89240e1a3f50] system_call_fastpath at ffffffff8f395f92

    crash&gt; net_device.state ffff89443b0c0000
      state = 0x5  (__LINK_STATE_START| __LINK_STATE_NOCARRIER)

To prevent this scenario, we also make sure that the netdevice is present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48850/">CVE-2022-48850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48850">CVE-2022-48850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228071">SUSE bug 1228071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48851" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: gdm724x: fix use after free in gdm_lte_rx()

The netif_rx_ni() function frees the skb so we can't dereference it to
save the skb-&gt;len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48852</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48852" ref_url="https://www.suse.com/security/cve/CVE-2022-48852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: hdmi: Unregister codec device on unbind

On bind we will register the HDMI codec device but we don't unregister
it on unbind, leading to a device leakage. Unregister our device at
unbind.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48852/">CVE-2022-48852 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48852">CVE-2022-48852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228067">SUSE bug 1228067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48853" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

swiotlb: fix info leak with DMA_FROM_DEVICE

The problem I'm addressing was discovered by the LTP test covering
cve-2018-1000204.

A short description of what happens follows:
1) The test case issues a command code 00 (TEST UNIT READY) via the SG_IO
   interface with: dxfer_len == 524288, dxdfer_dir == SG_DXFER_FROM_DEV
   and a corresponding dxferp. The peculiar thing about this is that TUR
   is not reading from the device.
2) In sg_start_req() the invocation of blk_rq_map_user() effectively
   bounces the user-space buffer. As if the device was to transfer into
   it. Since commit a45b599ad808 ("scsi: sg: allocate with __GFP_ZERO in
   sg_build_indirect()") we make sure this first bounce buffer is
   allocated with GFP_ZERO.
3) For the rest of the story we keep ignoring that we have a TUR, so the
   device won't touch the buffer we prepare as if the we had a
   DMA_FROM_DEVICE type of situation. My setup uses a virtio-scsi device
   and the  buffer allocated by SG is mapped by the function
   virtqueue_add_split() which uses DMA_FROM_DEVICE for the "in" sgs (here
   scatter-gather and not scsi generics). This mapping involves bouncing
   via the swiotlb (we need swiotlb to do virtio in protected guest like
   s390 Secure Execution, or AMD SEV).
4) When the SCSI TUR is done, we first copy back the content of the second
   (that is swiotlb) bounce buffer (which most likely contains some
   previous IO data), to the first bounce buffer, which contains all
   zeros.  Then we copy back the content of the first bounce buffer to
   the user-space buffer.
5) The test case detects that the buffer, which it zero-initialized,
  ain't all zeros and fails.

One can argue that this is an swiotlb problem, because without swiotlb
we leak all zeros, and the swiotlb should be transparent in a sense that
it does not affect the outcome (if all other participants are well
behaved).

Copying the content of the original buffer into the swiotlb buffer is
the only way I can think of to make swiotlb transparent in such
scenarios. So let's do just that if in doubt, but allow the driver
to tell us that the whole mapped buffer is going to be overwritten,
in which case we can preserve the old behavior and avoid the performance
impact of the extra bounce.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48855" ref_url="https://www.suse.com/security/cve/CVE-2022-48855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: fix kernel-infoleak for SCTP sockets

syzbot reported a kernel infoleak [1] of 4 bytes.

After analysis, it turned out r-&gt;idiag_expires is not initialized
if inet_sctp_diag_fill() calls inet_diag_msg_common_fill()

Make sure to clear idiag_timer/idiag_retrans/idiag_expires
and let inet_diag_msg_sctpasoc_fill() fill them again if needed.

[1]

BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:154 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:154 [inline]
 _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668
 copy_to_iter include/linux/uio.h:162 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2d5/0x11b0 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3696 [inline]
 netlink_recvmsg+0x669/0x1c80 net/netlink/af_netlink.c:1977
 sock_recvmsg_nosec net/socket.c:948 [inline]
 sock_recvmsg net/socket.c:966 [inline]
 __sys_recvfrom+0x795/0xa10 net/socket.c:2097
 __do_sys_recvfrom net/socket.c:2115 [inline]
 __se_sys_recvfrom net/socket.c:2111 [inline]
 __x64_sys_recvfrom+0x19d/0x210 net/socket.c:2111
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:737 [inline]
 slab_alloc_node mm/slub.c:3247 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4975
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1158 [inline]
 netlink_dump+0x3e5/0x16c0 net/netlink/af_netlink.c:2248
 __netlink_dump_start+0xcf8/0xe90 net/netlink/af_netlink.c:2373
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1341
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x40c/0x7e0 net/netlink/af_netlink.c:2494
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:277
 netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
 netlink_unicast+0x1093/0x1360 net/netlink/af_netlink.c:1343
 netlink_sendmsg+0x14d9/0x1720 net/netlink/af_netlink.c:1919
 sock_sendmsg_nosec net/socket.c:705 [inline]
 sock_sendmsg net/socket.c:725 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1061
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x645/0xe00 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 2508 are uninitialized
Memory access of size 2508 starts at ffff888114f9b000
Data copied to user address 00007f7fe09ff2e0

CPU: 1 PID: 3478 Comm: syz-executor306 Not tainted 5.17.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48855/">CVE-2022-48855 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48855">CVE-2022-48855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228003">SUSE bug 1228003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48856</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48856" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gianfar: ethtool: Fix refcount leak in gfar_get_ts_info

The of_find_compatible_node() function returns a node pointer with
refcount incremented, We should use of_node_put() on it when done
Add the missing of_node_put() to release the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48857</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: port100: fix use-after-free in port100_send_complete

Syzbot reported UAF in port100_send_complete(). The root case is in
missing usb_kill_urb() calls on error handling path of -&gt;probe function.

port100_send_complete() accesses devm allocated memory which will be
freed on probe failure. We should kill this urbs before returning an
error from probe function to prevent reported use-after-free

Fail log:

BUG: KASAN: use-after-free in port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935
Read of size 1 at addr ffff88801bb59540 by task ksoftirqd/2/26
...
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935
 __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1670

...

Allocated by task 1255:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:45 [inline]
 set_alloc_info mm/kasan/common.c:436 [inline]
 ____kasan_kmalloc mm/kasan/common.c:515 [inline]
 ____kasan_kmalloc mm/kasan/common.c:474 [inline]
 __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:524
 alloc_dr drivers/base/devres.c:116 [inline]
 devm_kmalloc+0x96/0x1d0 drivers/base/devres.c:823
 devm_kzalloc include/linux/device.h:209 [inline]
 port100_probe+0x8a/0x1320 drivers/nfc/port100.c:1502

Freed by task 1255:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track+0x21/0x30 mm/kasan/common.c:45
 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:370
 ____kasan_slab_free mm/kasan/common.c:366 [inline]
 ____kasan_slab_free+0xff/0x140 mm/kasan/common.c:328
 kasan_slab_free include/linux/kasan.h:236 [inline]
 __cache_free mm/slab.c:3437 [inline]
 kfree+0xf8/0x2b0 mm/slab.c:3794
 release_nodes+0x112/0x1a0 drivers/base/devres.c:501
 devres_release_all+0x114/0x190 drivers/base/devres.c:530
 really_probe+0x626/0xcc0 drivers/base/dd.c:670
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48858</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48858" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix a race on command flush flow

Fix a refcount use after free warning due to a race on command entry.
Such race occurs when one of the commands releases its last refcount and
frees its index and entry while another process running command flush
flow takes refcount to this command entry. The process which handles
commands flush may see this command as needed to be flushed if the other
process released its refcount but didn't release the index yet. Fix it
by adding the needed spin lock.

It fixes the following warning trace:

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 11 PID: 540311 at lib/refcount.c:25 refcount_warn_saturate+0x80/0xe0
...
RIP: 0010:refcount_warn_saturate+0x80/0xe0
...
Call Trace:
 &lt;TASK&gt;
 mlx5_cmd_trigger_completions+0x293/0x340 [mlx5_core]
 mlx5_cmd_flush+0x3a/0xf0 [mlx5_core]
 enter_error_state+0x44/0x80 [mlx5_core]
 mlx5_fw_fatal_reporter_err_work+0x37/0xe0 [mlx5_core]
 process_one_work+0x1be/0x390
 worker_thread+0x4d/0x3d0
 ? rescuer_thread+0x350/0x350
 kthread+0x141/0x160
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48859</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48859" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr

This node pointer is returned by of_find_compatible_node() with
refcount incremented. Calling of_node_put() to aovid the refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: Fix error handling in xemaclite_of_probe

This node pointer is returned by of_parse_phandle() with refcount
incremented in this function. Calling of_node_put() to avoid the
refcount leak. As the remove function do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48861" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: fix use-after-free on vp_vdpa_remove

When vp_vdpa driver is unbind, vp_vdpa is freed in vdpa_unregister_device
and then vp_vdpa-&gt;mdev.pci_dev is dereferenced in vp_modern_remove,
triggering use-after-free.

Call Trace of unbinding driver free vp_vdpa :
do_syscall_64
  vfs_write
    kernfs_fop_write_iter
      device_release_driver_internal
        pci_device_remove
          vp_vdpa_remove
            vdpa_unregister_device
              kobject_release
                device_release
                  kfree

Call Trace of dereference vp_vdpa-&gt;mdev.pci_dev:
vp_modern_remove
  pci_release_selected_regions
    pci_release_region
      pci_resource_len
        pci_resource_end
          (dev)-&gt;resource[(bar)].end
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: fix hung thread due to erroneous iotlb entries

In vhost_iotlb_add_range_ctx(), range size can overflow to 0 when
start is 0 and last is ULONG_MAX. One instance where it can happen
is when userspace sends an IOTLB message with iova=size=uaddr=0
(vhost_process_iotlb_msg). So, an entry with size = 0, start = 0,
last = ULONG_MAX ends up in the iotlb. Next time a packet is sent,
iotlb_access_ok() loops indefinitely due to that erroneous entry.

	Call Trace:
	 &lt;TASK&gt;
	 iotlb_access_ok+0x21b/0x3e0 drivers/vhost/vhost.c:1340
	 vq_meta_prefetch+0xbc/0x280 drivers/vhost/vhost.c:1366
	 vhost_transport_do_send_pkt+0xe0/0xfd0 drivers/vhost/vsock.c:104
	 vhost_worker+0x23d/0x3d0 drivers/vhost/vhost.c:372
	 kthread+0x2e9/0x3a0 kernel/kthread.c:377
	 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
	 &lt;/TASK&gt;

Reported by syzbot at:
	https://syzkaller.appspot.com/bug?extid=0abd373e2e50d704db87

To fix this, do two things:

1. Return -EINVAL in vhost_chr_write_iter() when userspace asks to map
   a range with size 0.
2. Fix vhost_iotlb_add_range_ctx() to handle the range [0, ULONG_MAX]
   by splitting it into two entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: Fix memory leak in dsp_pipeline_build()

dsp_pipeline_build() allocates dup pointer by kstrdup(cfg),
but then it updates dup variable by strsep(&amp;dup, "|").
As a result when it calls kfree(dup), the dup variable contains NULL.

Found by Linux Driver Verification project (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48864</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48864" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48864" ref_url="https://www.suse.com/security/cve/CVE-2022-48864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command

When control vq receives a VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command
request from the driver, presently there is no validation against the
number of queue pairs to configure, or even if multiqueue had been
negotiated or not is unverified. This may lead to kernel panic due to
uninitialized resource for the queues were there any bogus request
sent down by untrusted driver. Tie up the loose ends there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48864/">CVE-2022-48864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48864">CVE-2022-48864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228011">SUSE bug 1228011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48865</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48865" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48865" ref_url="https://www.suse.com/security/cve/CVE-2022-48865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix kernel panic when enabling bearer

When enabling a bearer on a node, a kernel panic is observed:

[    4.498085] RIP: 0010:tipc_mon_prep+0x4e/0x130 [tipc]
...
[    4.520030] Call Trace:
[    4.520689]  &lt;IRQ&gt;
[    4.521236]  tipc_link_build_proto_msg+0x375/0x750 [tipc]
[    4.522654]  tipc_link_build_state_msg+0x48/0xc0 [tipc]
[    4.524034]  __tipc_node_link_up+0xd7/0x290 [tipc]
[    4.525292]  tipc_rcv+0x5da/0x730 [tipc]
[    4.526346]  ? __netif_receive_skb_core+0xb7/0xfc0
[    4.527601]  tipc_l2_rcv_msg+0x5e/0x90 [tipc]
[    4.528737]  __netif_receive_skb_list_core+0x20b/0x260
[    4.530068]  netif_receive_skb_list_internal+0x1bf/0x2e0
[    4.531450]  ? dev_gro_receive+0x4c2/0x680
[    4.532512]  napi_complete_done+0x6f/0x180
[    4.533570]  virtnet_poll+0x29c/0x42e [virtio_net]
...

The node in question is receiving activate messages in another
thread after changing bearer status to allow message sending/
receiving in current thread:

         thread 1           |              thread 2
         --------           |              --------
                            |
tipc_enable_bearer()        |
  test_and_set_bit_lock()   |
    tipc_bearer_xmit_skb()  |
                            | tipc_l2_rcv_msg()
                            |   tipc_rcv()
                            |     __tipc_node_link_up()
                            |       tipc_link_build_state_msg()
                            |         tipc_link_build_proto_msg()
                            |           tipc_mon_prep()
                            |           {
                            |             ...
                            |             // null-pointer dereference
                            |             u16 gen = mon-&gt;dom_gen;
                            |             ...
                            |           }
  // Not being executed yet |
  tipc_mon_create()         |
  {                         |
    ...                     |
    // allocate             |
    mon = kzalloc();        |
    ...                     |
  }                         |

Monitoring pointer in thread 2 is dereferenced before monitoring data
is allocated in thread 1. This causes kernel panic.

This commit fixes it by allocating the monitoring data before enabling
the bearer to receive messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48865/">CVE-2022-48865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48865">CVE-2022-48865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228065">SUSE bug 1228065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48866</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts

Syzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug.
The root case is in missing validation check of actual number of endpoints.

Code should not blindly access usb_host_interface::endpoint array, since
it may contain less endpoints than code expects.

Fix it by adding missing validaion check and print an error if
number of endpoints do not match expected number
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228785">SUSE bug 1228785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48868" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Let probe fail when workqueue cannot be enabled

The workqueue is enabled when the appropriate driver is loaded and
disabled when the driver is removed. When the driver is removed it
assumes that the workqueue was enabled successfully and proceeds to
free allocations made during workqueue enabling.

Failure during workqueue enabling does not prevent the driver from
being loaded. This is because the error path within drv_enable_wq()
returns success unless a second failure is encountered
during the error path. By returning success it is possible to load
the driver even if the workqueue cannot be enabled and
allocations that do not exist are attempted to be freed during
driver remove.

Some examples of problematic flows:
(a)

 idxd_dmaengine_drv_probe() -&gt; drv_enable_wq() -&gt; idxd_wq_request_irq():
 In above flow, if idxd_wq_request_irq() fails then
 idxd_wq_unmap_portal() is called on error exit path, but
 drv_enable_wq() returns 0 because idxd_wq_disable() succeeds. The
 driver is thus loaded successfully.

 idxd_dmaengine_drv_remove()-&gt;drv_disable_wq()-&gt;idxd_wq_unmap_portal()
 Above flow on driver unload triggers the WARN in devm_iounmap() because
 the device resource has already been removed during error path of
 drv_enable_wq().

(b)

 idxd_dmaengine_drv_probe() -&gt; drv_enable_wq() -&gt; idxd_wq_request_irq():
 In above flow, if idxd_wq_request_irq() fails then
 idxd_wq_init_percpu_ref() is never called to initialize the percpu
 counter, yet the driver loads successfully because drv_enable_wq()
 returns 0.

 idxd_dmaengine_drv_remove()-&gt;__idxd_wq_quiesce()-&gt;percpu_ref_kill():
 Above flow on driver unload triggers a BUG when attempting to drop the
 initial ref of the uninitialized percpu ref:
 BUG: kernel NULL pointer dereference, address: 0000000000000010

Fix the drv_enable_wq() error path by returning the original error that
indicates failure of workqueue enabling. This ensures that the probe
fails when an error is encountered and the driver remove paths are only
attempted when the workqueue was enabled successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48869</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadgetfs: Fix race between mounting and unmounting

The syzbot fuzzer and Gerald Lee have identified a use-after-free bug
in the gadgetfs driver, involving processes concurrently mounting and
unmounting the gadgetfs filesystem.  In particular, gadgetfs_fill_super()
can race with gadgetfs_kill_sb(), causing the latter to deallocate
the_device while the former is using it.  The output from KASAN says,
in part:

BUG: KASAN: use-after-free in instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
BUG: KASAN: use-after-free in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
BUG: KASAN: use-after-free in __refcount_sub_and_test include/linux/refcount.h:272 [inline]
BUG: KASAN: use-after-free in __refcount_dec_and_test include/linux/refcount.h:315 [inline]
BUG: KASAN: use-after-free in refcount_dec_and_test include/linux/refcount.h:333 [inline]
BUG: KASAN: use-after-free in put_dev drivers/usb/gadget/legacy/inode.c:159 [inline]
BUG: KASAN: use-after-free in gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086
Write of size 4 at addr ffff8880276d7840 by task syz-executor126/18689

CPU: 0 PID: 18689 Comm: syz-executor126 Not tainted 6.1.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
...
 atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
 __refcount_sub_and_test include/linux/refcount.h:272 [inline]
 __refcount_dec_and_test include/linux/refcount.h:315 [inline]
 refcount_dec_and_test include/linux/refcount.h:333 [inline]
 put_dev drivers/usb/gadget/legacy/inode.c:159 [inline]
 gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086
 deactivate_locked_super+0xa7/0xf0 fs/super.c:332
 vfs_get_super fs/super.c:1190 [inline]
 get_tree_single+0xd0/0x160 fs/super.c:1207
 vfs_get_tree+0x88/0x270 fs/super.c:1531
 vfs_fsconfig_locked fs/fsopen.c:232 [inline]

The simplest solution is to ensure that gadgetfs_fill_super() and
gadgetfs_kill_sb() are serialized by making them both acquire a new
mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48870</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48870" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: fix possible null-ptr-defer in spk_ttyio_release

Run the following tests on the qemu platform:

syzkaller:~# modprobe speakup_audptr
 input: Speakup as /devices/virtual/input/input4
 initialized device: /dev/synth, node (MAJOR 10, MINOR 125)
 speakup 3.1.6: initialized
 synth name on entry is: (null)
 synth probe

spk_ttyio_initialise_ldisc failed because tty_kopen_exclusive returned
failed (errno -16), then remove the module, we will get a null-ptr-defer
problem, as follow:

syzkaller:~# modprobe -r speakup_audptr
 releasing synth audptr
 BUG: kernel NULL pointer dereference, address: 0000000000000080
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 0 P4D 0
 Oops: 0002 [#1] PREEMPT SMP PTI
 CPU: 2 PID: 204 Comm: modprobe Not tainted 6.1.0-rc6-dirty #1
 RIP: 0010:mutex_lock+0x14/0x30
 Call Trace:
 &lt;TASK&gt;
  spk_ttyio_release+0x19/0x70 [speakup]
  synth_release.part.6+0xac/0xc0 [speakup]
  synth_remove+0x56/0x60 [speakup]
  __x64_sys_delete_module+0x156/0x250
  ? fpregs_assert_state_consistent+0x1d/0x50
  do_syscall_64+0x37/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 &lt;/TASK&gt;
 Modules linked in: speakup_audptr(-) speakup
 Dumping ftrace buffer:

in_synth-&gt;dev was not initialized during modprobe, so we add check
for in_synth-&gt;dev to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48871" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer

Driver's probe allocates memory for RX FIFO (port-&gt;rx_fifo) based on
default RX FIFO depth, e.g. 16.  Later during serial startup the
qcom_geni_serial_port_setup() updates the RX FIFO depth
(port-&gt;rx_fifo_depth) to match real device capabilities, e.g. to 32.

The RX UART handle code will read "port-&gt;rx_fifo_depth" number of words
into "port-&gt;rx_fifo" buffer, thus exceeding the bounds.  This can be
observed in certain configurations with Qualcomm Bluetooth HCI UART
device and KASAN:

  Bluetooth: hci0: QCA Product ID   :0x00000010
  Bluetooth: hci0: QCA SOC Version  :0x400a0200
  Bluetooth: hci0: QCA ROM Version  :0x00000200
  Bluetooth: hci0: QCA Patch Version:0x00000d2b
  Bluetooth: hci0: QCA controller version 0x02000200
  Bluetooth: hci0: QCA Downloading qca/htbtfw20.tlv
  bluetooth hci0: Direct firmware load for qca/htbtfw20.tlv failed with error -2
  Bluetooth: hci0: QCA Failed to request file: qca/htbtfw20.tlv (-2)
  Bluetooth: hci0: QCA Failed to download patch (-2)
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in handle_rx_uart+0xa8/0x18c
  Write of size 4 at addr ffff279347d578c0 by task swapper/0/0

  CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rt5-00350-gb2450b7e00be-dirty #26
  Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)
  Call trace:
   dump_backtrace.part.0+0xe0/0xf0
   show_stack+0x18/0x40
   dump_stack_lvl+0x8c/0xb8
   print_report+0x188/0x488
   kasan_report+0xb4/0x100
   __asan_store4+0x80/0xa4
   handle_rx_uart+0xa8/0x18c
   qcom_geni_serial_handle_rx+0x84/0x9c
   qcom_geni_serial_isr+0x24c/0x760
   __handle_irq_event_percpu+0x108/0x500
   handle_irq_event+0x6c/0x110
   handle_fasteoi_irq+0x138/0x2cc
   generic_handle_domain_irq+0x48/0x64

If the RX FIFO depth changes after probe, be sure to resize the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48872</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48872" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix use-after-free race condition for maps

It is possible that in between calling fastrpc_map_get() until
map-&gt;fl-&gt;lock is taken in fastrpc_free_map(), another thread can call
fastrpc_map_lookup() and get a reference to a map that is about to be
deleted.

Rewrite fastrpc_map_get() to only increase the reference count of a map
if it's non-zero. Propagate this to callers so they can know if a map is
about to be deleted.

Fixes this warning:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 5 PID: 10100 at lib/refcount.c:25 refcount_warn_saturate
...
Call trace:
 refcount_warn_saturate
 [fastrpc_map_get inlined]
 [fastrpc_map_lookup inlined]
 fastrpc_map_create
 fastrpc_internal_invoke
 fastrpc_device_ioctl
 __arm64_sys_ioctl
 invoke_syscall
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229519">SUSE bug 1229519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48873</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Don't remove map on creater_process and device_release

Do not remove the map from the list on error path in
fastrpc_init_create_process, instead call fastrpc_map_put, to avoid
use-after-free. Do not remove it on fastrpc_device_release either,
call fastrpc_map_put instead.

The fastrpc_free_map is the only proper place to remove the map.
This is called only after the reference count is 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229513">SUSE bug 1229513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48875</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48875" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: sdata can be NULL during AMPDU start

ieee80211_tx_ba_session_handle_start() may get NULL for sdata when a
deauthentication is ongoing.

Here a trace triggering the race with the hostapd test
multi_ap_fronthaul_on_ap:

(gdb) list *drv_ampdu_action+0x46
0x8b16 is in drv_ampdu_action (net/mac80211/driver-ops.c:396).
391             int ret = -EOPNOTSUPP;
392
393             might_sleep();
394
395             sdata = get_bss_sdata(sdata);
396             if (!check_sdata_in_driver(sdata))
397                     return -EIO;
398
399             trace_drv_ampdu_action(local, sdata, params);
400

wlan0: moving STA 02:00:00:00:03:00 to state 3
wlan0: associated
wlan0: deauthenticating from 02:00:00:00:03:00 by local choice (Reason: 3=DEAUTH_LEAVING)
wlan3.sta1: Open BA session requested for 02:00:00:00:00:00 tid 0
wlan3.sta1: dropped frame to 02:00:00:00:00:00 (unauthorized port)
wlan0: moving STA 02:00:00:00:03:00 to state 2
wlan0: moving STA 02:00:00:00:03:00 to state 1
wlan0: Removed STA 02:00:00:00:03:00
wlan0: Destroyed STA 02:00:00:00:03:00
BUG: unable to handle page fault for address: fffffffffffffb48
PGD 11814067 P4D 11814067 PUD 11816067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted: G        W          6.1.0-rc8-wt+ #59
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
Workqueue: phy3 ieee80211_ba_session_work [mac80211]
RIP: 0010:drv_ampdu_action+0x46/0x280 [mac80211]
Code: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 eb 10 0e 00 00 &lt;8b&gt; 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85
RSP: 0018:ffffc900025ebd20 EFLAGS: 00010287
RAX: 0000000000000000 RBX: fffffffffffff1f0 RCX: ffff888102228240
RDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40
RBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000000 R12: ffff888118c18ec0
R13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8
FS:  0000000000000000(0000) GS:ffff88817a600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0
Call Trace:
 &lt;TASK&gt;
 ieee80211_tx_ba_session_handle_start+0xd0/0x190 [mac80211]
 ieee80211_ba_session_work+0xff/0x2e0 [mac80211]
 process_one_work+0x29f/0x620
 worker_thread+0x4d/0x3d0
 ? process_one_work+0x620/0x620
 kthread+0xfb/0x120
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48878</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_qca: Fix driver shutdown on closed serdev

The driver shutdown callback (which sends EDL_SOC_RESET to the device
over serdev) should not be invoked when HCI device is not open (e.g. if
hci_dev_open_sync() failed), because the serdev and its TTY are not open
either.  Also skip this step if device is powered off
(qca_power_shutdown()).

The shutdown callback causes use-after-free during system reboot with
Qualcomm Atheros Bluetooth:

  Unable to handle kernel paging request at virtual address
  0072662f67726fd7
  ...
  CPU: 6 PID: 1 Comm: systemd-shutdow Tainted: G        W
  6.1.0-rt5-00325-g8a5f56bcfcca #8
  Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)
  Call trace:
   tty_driver_flush_buffer+0x4/0x30
   serdev_device_write_flush+0x24/0x34
   qca_serdev_shutdown+0x80/0x130 [hci_uart]
   device_shutdown+0x15c/0x260
   kernel_restart+0x48/0xac

KASAN report:

  BUG: KASAN: use-after-free in tty_driver_flush_buffer+0x1c/0x50
  Read of size 8 at addr ffff16270c2e0018 by task systemd-shutdow/1

  CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted
  6.1.0-next-20221220-00014-gb85aaf97fb01-dirty #28
  Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)
  Call trace:
   dump_backtrace.part.0+0xdc/0xf0
   show_stack+0x18/0x30
   dump_stack_lvl+0x68/0x84
   print_report+0x188/0x488
   kasan_report+0xa4/0xf0
   __asan_load8+0x80/0xac
   tty_driver_flush_buffer+0x1c/0x50
   ttyport_write_flush+0x34/0x44
   serdev_device_write_flush+0x48/0x60
   qca_serdev_shutdown+0x124/0x274
   device_shutdown+0x1e8/0x350
   kernel_restart+0x48/0xb0
   __do_sys_reboot+0x244/0x2d0
   __arm64_sys_reboot+0x54/0x70
   invoke_syscall+0x60/0x190
   el0_svc_common.constprop.0+0x7c/0x160
   do_el0_svc+0x44/0xf0
   el0_svc+0x2c/0x6c
   el0t_64_sync_handler+0xbc/0x140
   el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48879</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: fix NULL-deref in init error path

In cases where runtime services are not supported or have been disabled,
the runtime services workqueue will never have been allocated.

Do not try to destroy the workqueue unconditionally in the unlikely
event that EFI initialisation fails to avoid dereferencing a NULL
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48880</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48880" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/surface: aggregator: Add missing call to ssam_request_sync_free()

Although rare, ssam_request_sync_init() can fail. In that case, the
request should be freed via ssam_request_sync_free(). Currently it is
leaked instead. Fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48881</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48881" ref_url="https://www.suse.com/security/cve/CVE-2022-48881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: Fix refcount leak in amd_pmc_probe

pci_get_domain_bus_and_slot() takes reference, the caller should release
the reference by calling pci_dev_put() after use. Call pci_dev_put() in
the error path to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48881/">CVE-2022-48881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48881">CVE-2022-48881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229559">SUSE bug 1229559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48882</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48882" ref_url="https://www.suse.com/security/cve/CVE-2022-48882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)

Upon updating MAC security entity (SecY) in hw offload path, the macsec
security association (SA) initialization routine is called. In case of
extended packet number (epn) is enabled the salt and ssci attributes are
retrieved using the MACsec driver rx_sa context which is unavailable when
updating a SecY property such as encoding-sa hence the null dereference.
Fix by using the provided SA to set those attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48882/">CVE-2022-48882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48882">CVE-2022-48882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229558">SUSE bug 1229558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48883</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent

A user is able to configure an arbitrary number of rx queues when
creating an interface via netlink. This doesn't work for child PKEY
interfaces because the child interface uses the parent receive channels.

Although the child shares the parent's receive channels, the number of
rx queues is important for the channel_stats array: the parent's rx
channel index is used to access the child's channel_stats. So the array
has to be at least as large as the parent's rx queue size for the
counting to work correctly and to prevent out of bound accesses.

This patch checks for the mentioned scenario and returns an error when
trying to create the interface. The error is propagated to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229560">SUSE bug 1229560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229561">SUSE bug 1229561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48884" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix command stats access after free

Command may fail while driver is reloading and can't accept FW commands
till command interface is reinitialized. Such command failure is being
logged to command stats. This results in NULL pointer access as command
stats structure is being freed and reallocated during mlx5 devlink
reload (see kernel log below).

Fix it by making command stats statically allocated on driver probe.

Kernel log:
[ 2394.808802] BUG: unable to handle kernel paging request at 000000000002a9c0
[ 2394.810610] PGD 0 P4D 0
[ 2394.811811] Oops: 0002 [#1] SMP NOPTI
...
[ 2394.815482] RIP: 0010:native_queued_spin_lock_slowpath+0x183/0x1d0
...
[ 2394.829505] Call Trace:
[ 2394.830667]  _raw_spin_lock_irq+0x23/0x26
[ 2394.831858]  cmd_status_err+0x55/0x110 [mlx5_core]
[ 2394.833020]  mlx5_access_reg+0xe7/0x150 [mlx5_core]
[ 2394.834175]  mlx5_query_port_ptys+0x78/0xa0 [mlx5_core]
[ 2394.835337]  mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core]
[ 2394.836454]  ? kmem_cache_alloc_trace+0x140/0x1c0
[ 2394.837562]  __rh_call_get_link_ksettings+0x33/0x100
[ 2394.838663]  ? __rtnl_unlock+0x25/0x50
[ 2394.839755]  __ethtool_get_link_ksettings+0x72/0x150
[ 2394.840862]  duplex_show+0x6e/0xc0
[ 2394.841963]  dev_attr_show+0x1c/0x40
[ 2394.843048]  sysfs_kf_seq_show+0x9b/0x100
[ 2394.844123]  seq_read+0x153/0x410
[ 2394.845187]  vfs_read+0x91/0x140
[ 2394.846226]  ksys_read+0x4f/0xb0
[ 2394.847234]  do_syscall_64+0x5b/0x1a0
[ 2394.848228]  entry_SYSCALL_64_after_hwframe+0x65/0xca
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229562">SUSE bug 1229562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229563">SUSE bug 1229563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48885</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix potential memory leak in ice_gnss_tty_write()

The ice_gnss_tty_write() return directly if the write_buf alloc failed,
leaking the cmd_buf.

Fix by free cmd_buf if write_buf alloc failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229564">SUSE bug 1229564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48886</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48886" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48886" ref_url="https://www.suse.com/security/cve/CVE-2022-48886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Add check for kzalloc

Add the check for the return value of kzalloc in order to avoid
NULL pointer dereference.
Moreover, use the goto-label to share the clean code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48886/">CVE-2022-48886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48886">CVE-2022-48886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229548">SUSE bug 1229548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48887</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48887" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48887" ref_url="https://www.suse.com/security/cve/CVE-2022-48887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Remove rcu locks from user resources

User resource lookups used rcu to avoid two extra atomics. Unfortunately
the rcu paths were buggy and it was easy to make the driver crash by
submitting command buffers from two different threads. Because the
lookups never show up in performance profiles replace them with a
regular spin lock which fixes the races in accesses to those shared
resources.

Fixes kernel oops'es in IGT's vmwgfx execution_buffer stress test and
seen crashes with apps using shared resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48887/">CVE-2022-48887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48887">CVE-2022-48887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229547">SUSE bug 1229547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48888</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48888" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48888" ref_url="https://www.suse.com/security/cve/CVE-2022-48888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Fix memory leak in msm_mdss_parse_data_bus_icc_path

of_icc_get() alloc resources for path1, we should release it when not
need anymore. Early return when IS_ERR_OR_NULL(path0) may leak path1.
Defer getting path1 to fix this.

Patchwork: https://patchwork.freedesktop.org/patch/514264/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48888/">CVE-2022-48888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48888">CVE-2022-48888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229546">SUSE bug 1229546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48889" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48889" ref_url="https://www.suse.com/security/cve/CVE-2022-48889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof-nau8825: fix module alias overflow

The maximum name length for a platform_device_id entry is 20 characters
including the trailing NUL byte. The sof_nau8825.c file exceeds that,
which causes an obscure error message:

sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: illegal character encoding in string literal [-Werror,-Winvalid-source-encoding]
MODULE_ALIAS("platform:adl_max98373_nau8825&lt;U+0018&gt;&lt;AA&gt;");
                                                   ^~~~
include/linux/module.h:168:49: note: expanded from macro 'MODULE_ALIAS'
                                                ^~~~~~
include/linux/module.h:165:56: note: expanded from macro 'MODULE_INFO'
                                                       ^~~~
include/linux/moduleparam.h:26:47: note: expanded from macro '__MODULE_INFO'
                = __MODULE_INFO_PREFIX __stringify(tag) "=" info

I could not figure out how to make the module handling robust enough
to handle this better, but as a quick fix, using slightly shorter
names that are still unique avoids the build issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48889/">CVE-2022-48889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48889">CVE-2022-48889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229545">SUSE bug 1229545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48890</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48890" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM

storvsc_queuecommand() maps the scatter/gather list using scsi_dma_map(),
which in a confidential VM allocates swiotlb bounce buffers. If the I/O
submission fails in storvsc_do_io(), the I/O is typically retried by higher
level code, but the bounce buffer memory is never freed.  The mostly like
cause of I/O submission failure is a full VMBus channel ring buffer, which
is not uncommon under high I/O loads.  Eventually enough bounce buffer
memory leaks that the confidential VM can't do any I/O. The same problem
can arise in a non-confidential VM with kernel boot parameter
swiotlb=force.

Fix this by doing scsi_dma_unmap() in the case of an I/O submission
error, which frees the bounce buffer memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48891</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48891" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: da9211: Use irq handler when ready

If the system does not come from reset (like when it is kexec()), the
regulator might have an IRQ waiting for us.

If we enable the IRQ handler before its structures are ready, we crash.

This patch fixes:

[    1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078
[    1.316096] Call trace:
[    1.316101]  blocking_notifier_call_chain+0x20/0xa8
[    1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests
[    1.327823]  regulator_notifier_call_chain+0x1c/0x2c
[    1.327825]  da9211_irq_handler+0x68/0xf8
[    1.327829]  irq_thread+0x11c/0x234
[    1.327833]  kthread+0x13c/0x154
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48893</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48893" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48893" ref_url="https://www.suse.com/security/cve/CVE-2022-48893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Cleanup partial engine discovery failures

If we abort driver initialisation in the middle of gt/engine discovery,
some engines will be fully setup and some not. Those incompletely setup
engines only have 'engine-&gt;release == NULL' and so will leak any of the
common objects allocated.

v2:
 - Drop the destroy_pinned_context() helper for now.  It's not really
   worth it with just a single callsite at the moment.  (Janusz)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48893/">CVE-2022-48893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48893">CVE-2022-48893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229576">SUSE bug 1229576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48896" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix pci device refcount leak

As the comment of pci_get_domain_bus_and_slot() says, it
returns a PCI device with refcount incremented, when finish
using it, the caller must decrement the reference count by
calling pci_dev_put().

In ixgbe_get_first_secondary_devfn() and ixgbe_x550em_a_has_mii(),
pci_dev_put() is called to avoid leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48898" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dp: do not complete dp_aux_cmd_fifo_tx() if irq is not for aux transfer

There are 3 possible interrupt sources are handled by DP controller,
HPDstatus, Controller state changes and Aux read/write transaction.
At every irq, DP controller have to check isr status of every interrupt
sources and service the interrupt if its isr status bits shows interrupts
are pending. There is potential race condition may happen at current aux
isr handler implementation since it is always complete dp_aux_cmd_fifo_tx()
even irq is not for aux read or write transaction. This may cause aux read
transaction return premature if host aux data read is in the middle of
waiting for sink to complete transferring data to host while irq happen.
This will cause host's receiving buffer contains unexpected data. This
patch fixes this problem by checking aux isr and return immediately at
aux isr handler if there are no any isr status bits set.

Current there is a bug report regrading eDP edid corruption happen during
system booting up. After lengthy debugging to found that VIDEO_READY
interrupt was continuously firing during system booting up which cause
dp_aux_isr() to complete dp_aux_cmd_fifo_tx() prematurely to retrieve data
from aux hardware buffer which is not yet contains complete data transfer
from sink. This cause edid corruption.

Follows are the signature at kernel logs when problem happen,
EDID has corrupt header
panel-simple-dp-aux aux-aea0000.edp: Couldn't identify panel via EDID

Changes in v2:
-- do complete if (ret == IRQ_HANDLED) ay dp-aux_isr()
-- add more commit text

Changes in v3:
-- add Stephen suggested
-- dp_aux_isr() return IRQ_XXX back to caller
-- dp_ctrl_isr() return IRQ_XXX back to caller

Changes in v4:
-- split into two patches

Changes in v5:
-- delete empty line between tags

Changes in v6:
-- remove extra "that" and fixed line more than 75 char at commit text

Patchwork: https://patchwork.freedesktop.org/patch/516121/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48899" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/virtio: Fix GEM handle creation UAF

Userspace can guess the handle value and try to race GEM object creation
with handle close, resulting in a use-after-free if we dereference the
object after dropping the handle's reference.  For that reason, dropping
the handle's reference must be done *after* we are done dereferencing
the object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48901" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48901" ref_url="https://www.suse.com/security/cve/CVE-2022-48901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not start relocation until in progress drops are done

We hit a bug with a recovering relocation on mount for one of our file
systems in production.  I reproduced this locally by injecting errors
into snapshot delete with balance running at the same time.  This
presented as an error while looking up an extent item

  WARNING: CPU: 5 PID: 1501 at fs/btrfs/extent-tree.c:866 lookup_inline_extent_backref+0x647/0x680
  CPU: 5 PID: 1501 Comm: btrfs-balance Not tainted 5.16.0-rc8+ #8
  RIP: 0010:lookup_inline_extent_backref+0x647/0x680
  RSP: 0018:ffffae0a023ab960 EFLAGS: 00010202
  RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000000000
  RBP: ffff943fd2a39b60 R08: 0000000000000000 R09: 0000000000000001
  R10: 0001434088152de0 R11: 0000000000000000 R12: 0000000001d05000
  R13: ffff943fd2a39b60 R14: ffff943fdb96f2a0 R15: ffff9442fc923000
  FS:  0000000000000000(0000) GS:ffff944e9eb40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f1157b1fca8 CR3: 000000010f092000 CR4: 0000000000350ee0
  Call Trace:
   &lt;TASK&gt;
   insert_inline_extent_backref+0x46/0xd0
   __btrfs_inc_extent_ref.isra.0+0x5f/0x200
   ? btrfs_merge_delayed_refs+0x164/0x190
   __btrfs_run_delayed_refs+0x561/0xfa0
   ? btrfs_search_slot+0x7b4/0xb30
   ? btrfs_update_root+0x1a9/0x2c0
   btrfs_run_delayed_refs+0x73/0x1f0
   ? btrfs_update_root+0x1a9/0x2c0
   btrfs_commit_transaction+0x50/0xa50
   ? btrfs_update_reloc_root+0x122/0x220
   prepare_to_merge+0x29f/0x320
   relocate_block_group+0x2b8/0x550
   btrfs_relocate_block_group+0x1a6/0x350
   btrfs_relocate_chunk+0x27/0xe0
   btrfs_balance+0x777/0xe60
   balance_kthread+0x35/0x50
   ? btrfs_balance+0xe60/0xe60
   kthread+0x16b/0x190
   ? set_kthread_struct+0x40/0x40
   ret_from_fork+0x22/0x30
   &lt;/TASK&gt;

Normally snapshot deletion and relocation are excluded from running at
the same time by the fs_info-&gt;cleaner_mutex.  However if we had a
pending balance waiting to get the -&gt;cleaner_mutex, and a snapshot
deletion was running, and then the box crashed, we would come up in a
state where we have a half deleted snapshot.

Again, in the normal case the snapshot deletion needs to complete before
relocation can start, but in this case relocation could very well start
before the snapshot deletion completes, as we simply add the root to the
dead roots list and wait for the next time the cleaner runs to clean up
the snapshot.

Fix this by setting a bit on the fs_info if we have any DEAD_ROOT's that
had a pending drop_progress key.  If they do then we know we were in the
middle of the drop operation and set a flag on the fs_info.  Then
balance can wait until this flag is cleared to start up again.

If there are DEAD_ROOT's that don't have a drop_progress set then we're
safe to start balance right away as we'll be properly protected by the
cleaner_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48901/">CVE-2022-48901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48901">CVE-2022-48901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229607">SUSE bug 1229607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix relocation crash due to premature return from btrfs_commit_transaction()

We are seeing crashes similar to the following trace:

[38.969182] WARNING: CPU: 20 PID: 2105 at fs/btrfs/relocation.c:4070 btrfs_relocate_block_group+0x2dc/0x340 [btrfs]
[38.973556] CPU: 20 PID: 2105 Comm: btrfs Not tainted 5.17.0-rc4 #54
[38.974580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[38.976539] RIP: 0010:btrfs_relocate_block_group+0x2dc/0x340 [btrfs]
[38.980336] RSP: 0000:ffffb0dd42e03c20 EFLAGS: 00010206
[38.981218] RAX: ffff96cfc4ede800 RBX: ffff96cfc3ce0000 RCX: 000000000002ca14
[38.982560] RDX: 0000000000000000 RSI: 4cfd109a0bcb5d7f RDI: ffff96cfc3ce0360
[38.983619] RBP: ffff96cfc309c000 R08: 0000000000000000 R09: 0000000000000000
[38.984678] R10: ffff96cec0000001 R11: ffffe84c80000000 R12: ffff96cfc4ede800
[38.985735] R13: 0000000000000000 R14: 0000000000000000 R15: ffff96cfc3ce0360
[38.987146] FS:  00007f11c15218c0(0000) GS:ffff96d6dfb00000(0000) knlGS:0000000000000000
[38.988662] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[38.989398] CR2: 00007ffc922c8e60 CR3: 00000001147a6001 CR4: 0000000000370ee0
[38.990279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[38.991219] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[38.992528] Call Trace:
[38.992854]  &lt;TASK&gt;
[38.993148]  btrfs_relocate_chunk+0x27/0xe0 [btrfs]
[38.993941]  btrfs_balance+0x78e/0xea0 [btrfs]
[38.994801]  ? vsnprintf+0x33c/0x520
[38.995368]  ? __kmalloc_track_caller+0x351/0x440
[38.996198]  btrfs_ioctl_balance+0x2b9/0x3a0 [btrfs]
[38.997084]  btrfs_ioctl+0x11b0/0x2da0 [btrfs]
[38.997867]  ? mod_objcg_state+0xee/0x340
[38.998552]  ? seq_release+0x24/0x30
[38.999184]  ? proc_nr_files+0x30/0x30
[38.999654]  ? call_rcu+0xc8/0x2f0
[39.000228]  ? __x64_sys_ioctl+0x84/0xc0
[39.000872]  ? btrfs_ioctl_get_supported_features+0x30/0x30 [btrfs]
[39.001973]  __x64_sys_ioctl+0x84/0xc0
[39.002566]  do_syscall_64+0x3a/0x80
[39.003011]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[39.003735] RIP: 0033:0x7f11c166959b
[39.007324] RSP: 002b:00007fff2543e998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[39.008521] RAX: ffffffffffffffda RBX: 00007f11c1521698 RCX: 00007f11c166959b
[39.009833] RDX: 00007fff2543ea40 RSI: 00000000c4009420 RDI: 0000000000000003
[39.011270] RBP: 0000000000000003 R08: 0000000000000013 R09: 00007f11c16f94e0
[39.012581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff25440df3
[39.014046] R13: 0000000000000000 R14: 00007fff2543ea40 R15: 0000000000000001
[39.015040]  &lt;/TASK&gt;
[39.015418] ---[ end trace 0000000000000000 ]---
[43.131559] ------------[ cut here ]------------
[43.132234] kernel BUG at fs/btrfs/extent-tree.c:2717!
[43.133031] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[43.133702] CPU: 1 PID: 1839 Comm: btrfs Tainted: G        W         5.17.0-rc4 #54
[43.134863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[43.136426] RIP: 0010:unpin_extent_range+0x37a/0x4f0 [btrfs]
[43.139913] RSP: 0000:ffffb0dd4216bc70 EFLAGS: 00010246
[43.140629] RAX: 0000000000000000 RBX: ffff96cfc34490f8 RCX: 0000000000000001
[43.141604] RDX: 0000000080000001 RSI: 0000000051d00000 RDI: 00000000ffffffff
[43.142645] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff96cfd07dca50
[43.143669] R10: ffff96cfc46e8a00 R11: fffffffffffec000 R12: 0000000041d00000
[43.144657] R13: ffff96cfc3ce0000 R14: ffffb0dd4216bd08 R15: 0000000000000000
[43.145686] FS:  00007f7657dd68c0(0000) GS:ffff96d6df640000(0000) knlGS:0000000000000000
[43.146808] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[43.147584] CR2: 00007f7fe81bf5b0 CR3: 00000001093ee004 CR4: 0000000000370ee0
[43.148589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[43.149581] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48904" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Fix I/O page table memory leak

The current logic updates the I/O page table mode for the domain
before calling the logic to free memory used for the page table.
This results in IOMMU page table memory leak, and can be observed
when launching VM w/ pass-through devices.

Fix by freeing the memory used for page table before updating the mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: free reset-work-item when flushing

Fix a tiny memory leak when flushing the reset work queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48906</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48906" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48906" ref_url="https://www.suse.com/security/cve/CVE-2022-48906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Correctly set DATA_FIN timeout when number of retransmits is large

Syzkaller with UBSAN uncovered a scenario where a large number of
DATA_FIN retransmits caused a shift-out-of-bounds in the DATA_FIN
timeout calculation:

================================================================================
UBSAN: shift-out-of-bounds in net/mptcp/protocol.c:470:29
shift exponent 32 is too large for 32-bit type 'unsigned int'
CPU: 1 PID: 13059 Comm: kworker/1:0 Not tainted 5.17.0-rc2-00630-g5fbf21c90c60 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Workqueue: events mptcp_worker
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 ubsan_epilogue+0xb/0x5a lib/ubsan.c:151
 __ubsan_handle_shift_out_of_bounds.cold+0xb2/0x20e lib/ubsan.c:330
 mptcp_set_datafin_timeout net/mptcp/protocol.c:470 [inline]
 __mptcp_retrans.cold+0x72/0x77 net/mptcp/protocol.c:2445
 mptcp_worker+0x58a/0xa70 net/mptcp/protocol.c:2528
 process_one_work+0x9df/0x16d0 kernel/workqueue.c:2307
 worker_thread+0x95/0xe10 kernel/workqueue.c:2454
 kthread+0x2f4/0x3b0 kernel/kthread.c:377
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 &lt;/TASK&gt;
================================================================================

This change limits the maximum timeout by limiting the size of the
shift, which keeps all intermediate values in-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48906/">CVE-2022-48906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48906">CVE-2022-48906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229605">SUSE bug 1229605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48907</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48907" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

auxdisplay: lcd2s: Fix memory leak in -&gt;remove()

Once allocated the struct lcd2s_data is never freed.
Fix the memory leak by switching to devm_kzalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48909</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48909" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix connection leak

There's a potential leak issue under following execution sequence :

smc_release  				smc_connect_work
if (sk-&gt;sk_state == SMC_INIT)
					send_clc_confirim
	tcp_abort();
					...
					sk.sk_state = SMC_ACTIVE
smc_close_active
switch(sk-&gt;sk_state) {
...
case SMC_ACTIVE:
	smc_close_final()
	// then wait peer closed

Unfortunately, tcp_abort() may discard CLC CONFIRM messages that are
still in the tcp send buffer, in which case our connection token cannot
be delivered to the server side, which means that we cannot get a
passive close message at all. Therefore, it is impossible for the to be
disconnected at all.

This patch tries a very simple way to avoid this issue, once the state
has changed to SMC_ACTIVE after tcp_abort(), we can actively abort the
smc connection, considering that the state is SMC_INIT before
tcp_abort(), abandoning the complete disconnection process should not
cause too much problem.

In fact, this problem may exist as long as the CLC CONFIRM message is
not received by the server. Whether a timer should be added after
smc_close_final() needs to be discussed in the future. But even so, this
patch provides a faster release for connection in above case, it should
also be valuable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48910</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48910" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48910" ref_url="https://www.suse.com/security/cve/CVE-2022-48910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: ensure we call ipv6_mc_down() at most once

There are two reasons for addrconf_notify() to be called with NETDEV_DOWN:
either the network device is actually going down, or IPv6 was disabled
on the interface.

If either of them stays down while the other is toggled, we repeatedly
call the code for NETDEV_DOWN, including ipv6_mc_down(), while never
calling the corresponding ipv6_mc_up() in between. This will cause a
new entry in idev-&gt;mc_tomb to be allocated for each multicast group
the interface is subscribed to, which in turn leaks one struct ifmcaddr6
per nontrivial multicast group the interface is subscribed to.

The following reproducer will leak at least $n objects:

ip addr add ff2e::4242/32 dev eth0 autojoin
sysctl -w net.ipv6.conf.eth0.disable_ipv6=1
for i in $(seq 1 $n); do
	ip link set up eth0; ip link set down eth0
done

Joining groups with IPV6_ADD_MEMBERSHIP (unprivileged) or setting the
sysctl net.ipv6.conf.eth0.forwarding to 1 (=&gt; subscribing to ff02::2)
can also be used to create a nontrivial idev-&gt;mc_list, which will the
leak objects with the right up-down-sequence.

Based on both sources for NETDEV_DOWN events the interface IPv6 state
should be considered:

 - not ready if the network interface is not ready OR IPv6 is disabled
   for it
 - ready if the network interface is ready AND IPv6 is enabled for it

The functions ipv6_mc_up() and ipv6_down() should only be run when this
state changes.

Implement this by remembering when the IPv6 state is ready, and only
run ipv6_mc_down() if it actually changed from ready to not ready.

The other direction (not ready -&gt; ready) already works correctly, as:

 - the interface notification triggered codepath for NETDEV_UP /
   NETDEV_CHANGE returns early if ipv6 is disabled, and
 - the disable_ipv6=0 triggered codepath skips fully initializing the
   interface as long as addrconf_link_ready(dev) returns false
 - calling ipv6_mc_up() repeatedly does not leak anything
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48910/">CVE-2022-48910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48910">CVE-2022-48910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229632">SUSE bug 1229632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48911</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48911" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_queue: fix possible use-after-free

Eric Dumazet says:
  The sock_hold() side seems suspect, because there is no guarantee
  that sk_refcnt is not already 0.

On failure, we cannot queue the packet and need to indicate an
error.  The packet will be dropped by the caller.

v2: split skb prefetch hunk into separate change
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229640">SUSE bug 1229640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: fix use-after-free in __nf_register_net_hook()

We must not dereference @new_hooks after nf_hook_mutex has been released,
because other threads might have freed our allocated hooks already.

BUG: KASAN: use-after-free in nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [inline]
BUG: KASAN: use-after-free in hooks_validate net/netfilter/core.c:171 [inline]
BUG: KASAN: use-after-free in __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438
Read of size 2 at addr ffff88801c1a8000 by task syz-executor237/4430

CPU: 1 PID: 4430 Comm: syz-executor237 Not tainted 5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x336 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [inline]
 hooks_validate net/netfilter/core.c:171 [inline]
 __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438
 nf_register_net_hook+0x114/0x170 net/netfilter/core.c:571
 nf_register_net_hooks+0x59/0xc0 net/netfilter/core.c:587
 nf_synproxy_ipv6_init+0x85/0xe0 net/netfilter/nf_synproxy_core.c:1218
 synproxy_tg6_check+0x30d/0x560 net/ipv6/netfilter/ip6t_SYNPROXY.c:81
 xt_check_target+0x26c/0x9e0 net/netfilter/x_tables.c:1038
 check_target net/ipv6/netfilter/ip6_tables.c:530 [inline]
 find_check_entry.constprop.0+0x7f1/0x9e0 net/ipv6/netfilter/ip6_tables.c:573
 translate_table+0xc8b/0x1750 net/ipv6/netfilter/ip6_tables.c:735
 do_replace net/ipv6/netfilter/ip6_tables.c:1153 [inline]
 do_ip6t_set_ctl+0x56e/0xb90 net/ipv6/netfilter/ip6_tables.c:1639
 nf_setsockopt+0x83/0xe0 net/netfilter/nf_sockopt.c:101
 ipv6_setsockopt+0x122/0x180 net/ipv6/ipv6_sockglue.c:1024
 rawv6_setsockopt+0xd3/0x6a0 net/ipv6/raw.c:1084
 __sys_setsockopt+0x2db/0x610 net/socket.c:2180
 __do_sys_setsockopt net/socket.c:2191 [inline]
 __se_sys_setsockopt net/socket.c:2188 [inline]
 __x64_sys_setsockopt+0xba/0x150 net/socket.c:2188
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f65a1ace7d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f65a1a7f308 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f65a1ace7d9
RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003
RBP: 00007f65a1b574c8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000000 R11: 0000000000000246 R12: 00007f65a1b55130
R13: 00007f65a1b574c0 R14: 00007f65a1b24090 R15: 0000000000022000
 &lt;/TASK&gt;

The buggy address belongs to the page:
page:ffffea0000706a00 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1c1a8
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea0001c1b108 ffffea000046dd08 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x52dc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_ZERO), pid 4430, ts 1061781545818, free_ts 1061791488993
 prep_new_page mm/page_alloc.c:2434 [inline]
 get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4165
 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5389
 __alloc_pages_node include/linux/gfp.h:572 [inline]
 alloc_pages_node include/linux/gfp.h:595 [inline]
 kmalloc_large_node+0x62/0x130 mm/slub.c:4438
 __kmalloc_node+0x35a/0x4a0 mm/slub.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229644">SUSE bug 1229644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48913" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blktrace: fix use after free for struct blk_trace

When tracing the whole disk, 'dropped' and 'msg' will be created
under 'q-&gt;debugfs_dir' and 'bt-&gt;dir' is NULL, thus blk_trace_free()
won't remove those files. What's worse, the following UAF can be
triggered because of accessing stale 'dropped' and 'msg':

==================================================================
BUG: KASAN: use-after-free in blk_dropped_read+0x89/0x100
Read of size 4 at addr ffff88816912f3d8 by task blktrace/1188

CPU: 27 PID: 1188 Comm: blktrace Not tainted 5.17.0-rc4-next-20220217+ #469
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-4
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x34/0x44
 print_address_description.constprop.0.cold+0xab/0x381
 ? blk_dropped_read+0x89/0x100
 ? blk_dropped_read+0x89/0x100
 kasan_report.cold+0x83/0xdf
 ? blk_dropped_read+0x89/0x100
 kasan_check_range+0x140/0x1b0
 blk_dropped_read+0x89/0x100
 ? blk_create_buf_file_callback+0x20/0x20
 ? kmem_cache_free+0xa1/0x500
 ? do_sys_openat2+0x258/0x460
 full_proxy_read+0x8f/0xc0
 vfs_read+0xc6/0x260
 ksys_read+0xb9/0x150
 ? vfs_write+0x3d0/0x3d0
 ? fpregs_assert_state_consistent+0x55/0x60
 ? exit_to_user_mode_prepare+0x39/0x1e0
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc080d92fd
Code: ce 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 1
RSP: 002b:00007fbb95ff9cb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 00007fbb95ff9dc0 RCX: 00007fbc080d92fd
RDX: 0000000000000100 RSI: 00007fbb95ff9cc0 RDI: 0000000000000045
RBP: 0000000000000045 R08: 0000000000406299 R09: 00000000fffffffd
R10: 000000000153afa0 R11: 0000000000000293 R12: 00007fbb780008c0
R13: 00007fbb78000938 R14: 0000000000608b30 R15: 00007fbb780029c8
 &lt;/TASK&gt;

Allocated by task 1050:
 kasan_save_stack+0x1e/0x40
 __kasan_kmalloc+0x81/0xa0
 do_blk_trace_setup+0xcb/0x410
 __blk_trace_setup+0xac/0x130
 blk_trace_ioctl+0xe9/0x1c0
 blkdev_ioctl+0xf1/0x390
 __x64_sys_ioctl+0xa5/0xe0
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Freed by task 1050:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_set_free_info+0x20/0x30
 __kasan_slab_free+0x103/0x180
 kfree+0x9a/0x4c0
 __blk_trace_remove+0x53/0x70
 blk_trace_ioctl+0x199/0x1c0
 blkdev_common_ioctl+0x5e9/0xb30
 blkdev_ioctl+0x1a5/0x390
 __x64_sys_ioctl+0xa5/0xe0
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

The buggy address belongs to the object at ffff88816912f380
 which belongs to the cache kmalloc-96 of size 96
The buggy address is located 88 bytes inside of
 96-byte region [ffff88816912f380, ffff88816912f3e0)
The buggy address belongs to the page:
page:000000009a1b4e7c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0f
flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)
raw: 0017ffffc0000200 ffffea00044f1100 dead000000000002 ffff88810004c780
raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff88816912f280: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
 ffff88816912f300: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
&gt;ffff88816912f380: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
                                                    ^
 ffff88816912f400: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
 ffff88816912f480: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48914" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/netfront: destroy queues before real_num_tx_queues is zeroed

xennet_destroy_queues() relies on info-&gt;netdev-&gt;real_num_tx_queues to
delete queues. Since d7dac083414eb5bb99a6d2ed53dc2c1b405224e5
("net-sysfs: update the queue counts in the unregistration path"),
unregister_netdev() indirectly sets real_num_tx_queues to 0. Those two
facts together means, that xennet_destroy_queues() called from
xennet_remove() cannot do its job, because it's called after
unregister_netdev(). This results in kfree-ing queues that are still
linked in napi, which ultimately crashes:

    BUG: kernel NULL pointer dereference, address: 0000000000000000
    #PF: supervisor read access in kernel mode
    #PF: error_code(0x0000) - not-present page
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP PTI
    CPU: 1 PID: 52 Comm: xenwatch Tainted: G        W         5.16.10-1.32.fc32.qubes.x86_64+ #226
    RIP: 0010:free_netdev+0xa3/0x1a0
    Code: ff 48 89 df e8 2e e9 00 00 48 8b 43 50 48 8b 08 48 8d b8 a0 fe ff ff 48 8d a9 a0 fe ff ff 49 39 c4 75 26 eb 47 e8 ed c1 66 ff &lt;48&gt; 8b 85 60 01 00 00 48 8d 95 60 01 00 00 48 89 ef 48 2d 60 01 00
    RSP: 0000:ffffc90000bcfd00 EFLAGS: 00010286
    RAX: 0000000000000000 RBX: ffff88800edad000 RCX: 0000000000000000
    RDX: 0000000000000001 RSI: ffffc90000bcfc30 RDI: 00000000ffffffff
    RBP: fffffffffffffea0 R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800edad050
    R13: ffff8880065f8f88 R14: 0000000000000000 R15: ffff8880066c6680
    FS:  0000000000000000(0000) GS:ffff8880f3300000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000000000000000 CR3: 00000000e998c006 CR4: 00000000003706e0
    Call Trace:
     &lt;TASK&gt;
     xennet_remove+0x13d/0x300 [xen_netfront]
     xenbus_dev_remove+0x6d/0xf0
     __device_release_driver+0x17a/0x240
     device_release_driver+0x24/0x30
     bus_remove_device+0xd8/0x140
     device_del+0x18b/0x410
     ? _raw_spin_unlock+0x16/0x30
     ? klist_iter_exit+0x14/0x20
     ? xenbus_dev_request_and_reply+0x80/0x80
     device_unregister+0x13/0x60
     xenbus_dev_changed+0x18e/0x1f0
     xenwatch_thread+0xc0/0x1a0
     ? do_wait_intr_irq+0xa0/0xa0
     kthread+0x16b/0x190
     ? set_kthread_struct+0x40/0x40
     ret_from_fork+0x22/0x30
     &lt;/TASK&gt;

Fix this by calling xennet_destroy_queues() from xennet_uninit(),
when real_num_tx_queues is still available. This ensures that queues are
destroyed when real_num_tx_queues is set to 0, regardless of how
unregister_netdev() was called.

Originally reported at
https://github.com/QubesOS/qubes-issues/issues/7257
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48915" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Fix TZ_GET_TRIP NULL pointer dereference

Do not call get_trip_hyst() from thermal_genl_cmd_tz_get_trip() if
the thermal zone does not define one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48916" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix double list_add when enabling VMD in scalable mode

When enabling VMD and IOMMU scalable mode, the following kernel panic
call trace/kernel log is shown in Eagle Stream platform (Sapphire Rapids
CPU) during booting:

pci 0000:59:00.5: Adding to iommu group 42
...
vmd 0000:59:00.5: PCI host bridge to bus 10000:80
pci 10000:80:01.0: [8086:352a] type 01 class 0x060400
pci 10000:80:01.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
pci 10000:80:01.0: enabling Extended Tags
pci 10000:80:01.0: PME# supported from D0 D3hot D3cold
pci 10000:80:01.0: DMAR: Setup RID2PASID failed
pci 10000:80:01.0: Failed to add to iommu group 42: -16
pci 10000:80:03.0: [8086:352b] type 01 class 0x060400
pci 10000:80:03.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
pci 10000:80:03.0: enabling Extended Tags
pci 10000:80:03.0: PME# supported from D0 D3hot D3cold
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:29!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.17.0-rc3+ #7
Hardware name: Lenovo ThinkSystem SR650V3/SB27A86647, BIOS ESE101Y-1.00 01/13/2022
Workqueue: events work_for_cpu_fn
RIP: 0010:__list_add_valid.cold+0x26/0x3f
Code: 9a 4a ab ff 4c 89 c1 48 c7 c7 40 0c d9 9e e8 b9 b1 fe ff 0f
      0b 48 89 f2 4c 89 c1 48 89 fe 48 c7 c7 f0 0c d9 9e e8 a2 b1
      fe ff &lt;0f&gt; 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 98 0c d9
      9e e8 8b b1 fe
RSP: 0000:ff5ad434865b3a40 EFLAGS: 00010246
RAX: 0000000000000058 RBX: ff4d61160b74b880 RCX: ff4d61255e1fffa8
RDX: 0000000000000000 RSI: 00000000fffeffff RDI: ffffffff9fd34f20
RBP: ff4d611d8e245c00 R08: 0000000000000000 R09: ff5ad434865b3888
R10: ff5ad434865b3880 R11: ff4d61257fdc6fe8 R12: ff4d61160b74b8a0
R13: ff4d61160b74b8a0 R14: ff4d611d8e245c10 R15: ff4d611d8001ba70
FS:  0000000000000000(0000) GS:ff4d611d5ea00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ff4d611fa1401000 CR3: 0000000aa0210001 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 intel_pasid_alloc_table+0x9c/0x1d0
 dmar_insert_one_dev_info+0x423/0x540
 ? device_to_iommu+0x12d/0x2f0
 intel_iommu_attach_device+0x116/0x290
 __iommu_attach_device+0x1a/0x90
 iommu_group_add_device+0x190/0x2c0
 __iommu_probe_device+0x13e/0x250
 iommu_probe_device+0x24/0x150
 iommu_bus_notifier+0x69/0x90
 blocking_notifier_call_chain+0x5a/0x80
 device_add+0x3db/0x7b0
 ? arch_memremap_can_ram_remap+0x19/0x50
 ? memremap+0x75/0x140
 pci_device_add+0x193/0x1d0
 pci_scan_single_device+0xb9/0xf0
 pci_scan_slot+0x4c/0x110
 pci_scan_child_bus_extend+0x3a/0x290
 vmd_enable_domain.constprop.0+0x63e/0x820
 vmd_probe+0x163/0x190
 local_pci_probe+0x42/0x80
 work_for_cpu_fn+0x13/0x20
 process_one_work+0x1e2/0x3b0
 worker_thread+0x1c4/0x3a0
 ? rescuer_thread+0x370/0x370
 kthread+0xc7/0xf0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
...
Kernel panic - not syncing: Fatal exception
Kernel Offset: 0x1ca00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
---[ end Kernel panic - not syncing: Fatal exception ]---

The following 'lspci' output shows devices '10000:80:*' are subdevices of
the VMD device 0000:59:00.5:

  $ lspci
  ...
  0000:59:00.5 RAID bus controller: Intel Corporation Volume Management Device NVMe RAID Controller (rev 20)
  ...
  10000:80:01.0 PCI bridge: Intel Corporation Device 352a (rev 03)
  10000:80:03.0 PCI bridge: Intel Corporation Device 352b (rev 03)
  10000:80:05.0 PCI bridge: Intel Corporation Device 352c (rev 03)
  10000:80:07.0 PCI bridge: Intel Corporation Device 352d (rev 03)
  10000:81:00.0 Non-Volatile memory controller: Intel Corporation NVMe Datacenter SSD [3DNAND, Beta Rock Controller]
  10000:82:00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48917</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48917" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min

While the $val/$val2 values passed in from userspace are always &gt;= 0
integers, the limits of the control can be signed integers and the $min
can be non-zero and less than zero. To correctly validate $val/$val2
against platform_max, add the $min offset to val first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mvm: check debugfs_dir ptr before use

When "debugfs=off" is used on the kernel command line, iwiwifi's
mvm module uses an invalid/unchecked debugfs_dir pointer and causes
a BUG:

 BUG: kernel NULL pointer dereference, address: 000000000000004f
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 503 Comm: modprobe Tainted: G        W         5.17.0-rc5 #7
 Hardware name: Dell Inc. Inspiron 15 5510/076F7Y, BIOS 2.4.1 11/05/2021
 RIP: 0010:iwl_mvm_dbgfs_register+0x692/0x700 [iwlmvm]
 Code: 69 a0 be 80 01 00 00 48 c7 c7 50 73 6a a0 e8 95 cf ee e0 48 8b 83 b0 1e 00 00 48 c7 c2 54 73 6a a0 be 64 00 00 00 48 8d 7d 8c &lt;48&gt; 8b 48 50 e8 15 22 07 e1 48 8b 43 28 48 8d 55 8c 48 c7 c7 5f 73
 RSP: 0018:ffffc90000a0ba68 EFLAGS: 00010246
 RAX: ffffffffffffffff RBX: ffff88817d6e3328 RCX: ffff88817d6e3328
 RDX: ffffffffa06a7354 RSI: 0000000000000064 RDI: ffffc90000a0ba6c
 RBP: ffffc90000a0bae0 R08: ffffffff824e4880 R09: ffffffffa069d620
 R10: ffffc90000a0ba00 R11: ffffffffffffffff R12: 0000000000000000
 R13: ffffc90000a0bb28 R14: ffff88817d6e3328 R15: ffff88817d6e3320
 FS:  00007f64dd92d740(0000) GS:ffff88847f640000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000000004f CR3: 000000016fc79001 CR4: 0000000000770ee0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? iwl_mvm_mac_setup_register+0xbdc/0xda0 [iwlmvm]
  iwl_mvm_start_post_nvm+0x71/0x100 [iwlmvm]
  iwl_op_mode_mvm_start+0xab8/0xb30 [iwlmvm]
  _iwl_op_mode_start+0x6f/0xd0 [iwlwifi]
  iwl_opmode_register+0x6a/0xe0 [iwlwifi]
  ? 0xffffffffa0231000
  iwl_mvm_init+0x35/0x1000 [iwlmvm]
  ? 0xffffffffa0231000
  do_one_initcall+0x5a/0x1b0
  ? kmem_cache_alloc+0x1e5/0x2f0
  ? do_init_module+0x1e/0x220
  do_init_module+0x48/0x220
  load_module+0x2602/0x2bc0
  ? __kernel_read+0x145/0x2e0
  ? kernel_read_file+0x229/0x290
  __do_sys_finit_module+0xc5/0x130
  ? __do_sys_finit_module+0xc5/0x130
  __x64_sys_finit_module+0x13/0x20
  do_syscall_64+0x38/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f64dda564dd
 Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1b 29 0f 00 f7 d8 64 89 01 48
 RSP: 002b:00007ffdba393f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f64dda564dd
 RDX: 0000000000000000 RSI: 00005575399e2ab2 RDI: 0000000000000001
 RBP: 000055753a91c5e0 R08: 0000000000000000 R09: 0000000000000002
 R10: 0000000000000001 R11: 0000000000000246 R12: 00005575399e2ab2
 R13: 000055753a91ceb0 R14: 0000000000000000 R15: 000055753a923018
  &lt;/TASK&gt;
 Modules linked in: btintel(+) btmtk bluetooth vfat snd_hda_codec_hdmi fat snd_hda_codec_realtek snd_hda_codec_generic iwlmvm(+) snd_sof_pci_intel_tgl mac80211 snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence soundwire_bus snd_sof_intel_hda snd_sof_pci snd_sof snd_sof_xtensa_dsp snd_soc_hdac_hda snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core btrfs snd_compress snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec raid6_pq iwlwifi snd_hda_core snd_pcm snd_timer snd soundcore cfg80211 intel_ish_ipc(+) thunderbolt rfkill intel_ishtp ucsi_acpi wmi i2c_hid_acpi i2c_hid evdev
 CR2: 000000000000004f
 ---[ end trace 0000000000000000 ]---

Check the debugfs_dir pointer for an error before using it.

[change to make both conditional]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48919" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix double free race when mount fails in cifs_get_root()

When cifs_get_root() fails during cifs_smb3_do_mount() we call
deactivate_locked_super() which eventually will call delayed_free() which
will free the context.
In this situation we should not proceed to enter the out: section in
cifs_smb3_do_mount() and free the same resources a second time.

[Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0

[Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G           OE     5.17.0-rc3+ #4
[Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019
[Thu Feb 10 12:59:06 2022] Call Trace:
[Thu Feb 10 12:59:06 2022]  &lt;IRQ&gt;
[Thu Feb 10 12:59:06 2022]  dump_stack_lvl+0x5d/0x78
[Thu Feb 10 12:59:06 2022]  print_address_description.constprop.0+0x24/0x150
[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022]  kasan_report.cold+0x7d/0x117
[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022]  __asan_load8+0x86/0xa0
[Thu Feb 10 12:59:06 2022]  rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022]  rcu_core+0x547/0xca0
[Thu Feb 10 12:59:06 2022]  ? call_rcu+0x3c0/0x3c0
[Thu Feb 10 12:59:06 2022]  ? __this_cpu_preempt_check+0x13/0x20
[Thu Feb 10 12:59:06 2022]  ? lock_is_held_type+0xea/0x140
[Thu Feb 10 12:59:06 2022]  rcu_core_si+0xe/0x10
[Thu Feb 10 12:59:06 2022]  __do_softirq+0x1d4/0x67b
[Thu Feb 10 12:59:06 2022]  __irq_exit_rcu+0x100/0x150
[Thu Feb 10 12:59:06 2022]  irq_exit_rcu+0xe/0x30
[Thu Feb 10 12:59:06 2022]  sysvec_hyperv_stimer0+0x9d/0xc0
...
[Thu Feb 10 12:59:07 2022] Freed by task 58179:
[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50
[Thu Feb 10 12:59:07 2022]  kasan_set_track+0x25/0x30
[Thu Feb 10 12:59:07 2022]  kasan_set_free_info+0x24/0x40
[Thu Feb 10 12:59:07 2022]  ____kasan_slab_free+0x137/0x170
[Thu Feb 10 12:59:07 2022]  __kasan_slab_free+0x12/0x20
[Thu Feb 10 12:59:07 2022]  slab_free_freelist_hook+0xb3/0x1d0
[Thu Feb 10 12:59:07 2022]  kfree+0xcd/0x520
[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0x149/0xbe0 [cifs]
[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]
[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140
[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0
[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210
[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0
[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae

[Thu Feb 10 12:59:07 2022] Last potentially related work creation:
[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50
[Thu Feb 10 12:59:07 2022]  __kasan_record_aux_stack+0xb6/0xc0
[Thu Feb 10 12:59:07 2022]  kasan_record_aux_stack_noalloc+0xb/0x10
[Thu Feb 10 12:59:07 2022]  call_rcu+0x76/0x3c0
[Thu Feb 10 12:59:07 2022]  cifs_umount+0xce/0xe0 [cifs]
[Thu Feb 10 12:59:07 2022]  cifs_kill_sb+0xc8/0xe0 [cifs]
[Thu Feb 10 12:59:07 2022]  deactivate_locked_super+0x5d/0xd0
[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0xab9/0xbe0 [cifs]
[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]
[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140
[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0
[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210
[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0
[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229660">SUSE bug 1229660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48920</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48920" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48920" ref_url="https://www.suse.com/security/cve/CVE-2022-48920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: get rid of warning on transaction commit when using flushoncommit

When using the flushoncommit mount option, during almost every transaction
commit we trigger a warning from __writeback_inodes_sb_nr():

  $ cat fs/fs-writeback.c:
  (...)
  static void __writeback_inodes_sb_nr(struct super_block *sb, ...
  {
        (...)
        WARN_ON(!rwsem_is_locked(&amp;sb-&gt;s_umount));
        (...)
  }
  (...)

The trace produced in dmesg looks like the following:

  [947.473890] WARNING: CPU: 5 PID: 930 at fs/fs-writeback.c:2610 __writeback_inodes_sb_nr+0x7e/0xb3
  [947.481623] Modules linked in: nfsd nls_cp437 cifs asn1_decoder cifs_arc4 fscache cifs_md4 ipmi_ssif
  [947.489571] CPU: 5 PID: 930 Comm: btrfs-transacti Not tainted 95.16.3-srb-asrock-00001-g36437ad63879 #186
  [947.497969] RIP: 0010:__writeback_inodes_sb_nr+0x7e/0xb3
  [947.502097] Code: 24 10 4c 89 44 24 18 c6 (...)
  [947.519760] RSP: 0018:ffffc90000777e10 EFLAGS: 00010246
  [947.523818] RAX: 0000000000000000 RBX: 0000000000963300 RCX: 0000000000000000
  [947.529765] RDX: 0000000000000000 RSI: 000000000000fa51 RDI: ffffc90000777e50
  [947.535740] RBP: ffff888101628a90 R08: ffff888100955800 R09: ffff888100956000
  [947.541701] R10: 0000000000000002 R11: 0000000000000001 R12: ffff888100963488
  [947.547645] R13: ffff888100963000 R14: ffff888112fb7200 R15: ffff888100963460
  [947.553621] FS:  0000000000000000(0000) GS:ffff88841fd40000(0000) knlGS:0000000000000000
  [947.560537] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [947.565122] CR2: 0000000008be50c4 CR3: 000000000220c000 CR4: 00000000001006e0
  [947.571072] Call Trace:
  [947.572354]  &lt;TASK&gt;
  [947.573266]  btrfs_commit_transaction+0x1f1/0x998
  [947.576785]  ? start_transaction+0x3ab/0x44e
  [947.579867]  ? schedule_timeout+0x8a/0xdd
  [947.582716]  transaction_kthread+0xe9/0x156
  [947.585721]  ? btrfs_cleanup_transaction.isra.0+0x407/0x407
  [947.590104]  kthread+0x131/0x139
  [947.592168]  ? set_kthread_struct+0x32/0x32
  [947.595174]  ret_from_fork+0x22/0x30
  [947.597561]  &lt;/TASK&gt;
  [947.598553] ---[ end trace 644721052755541c ]---

This is because we started using writeback_inodes_sb() to flush delalloc
when committing a transaction (when using -o flushoncommit), in order to
avoid deadlocks with filesystem freeze operations. This change was made
by commit ce8ea7cc6eb313 ("btrfs: don't call btrfs_start_delalloc_roots
in flushoncommit"). After that change we started producing that warning,
and every now and then a user reports this since the warning happens too
often, it spams dmesg/syslog, and a user is unsure if this reflects any
problem that might compromise the filesystem's reliability.

We can not just lock the sb-&gt;s_umount semaphore before calling
writeback_inodes_sb(), because that would at least deadlock with
filesystem freezing, since at fs/super.c:freeze_super() sync_filesystem()
is called while we are holding that semaphore in write mode, and that can
trigger a transaction commit, resulting in a deadlock. It would also
trigger the same type of deadlock in the unmount path. Possibly, it could
also introduce some other locking dependencies that lockdep would report.

To fix this call try_to_writeback_inodes_sb() instead of
writeback_inodes_sb(), because that will try to read lock sb-&gt;s_umount
and then will only call writeback_inodes_sb() if it was able to lock it.
This is fine because the cases where it can't read lock sb-&gt;s_umount
are during a filesystem unmount or during a filesystem freeze - in those
cases sb-&gt;s_umount is write locked and sync_filesystem() is called, which
calls writeback_inodes_sb(). In other words, in all cases where we can't
take a read lock on sb-&gt;s_umount, writeback is already being triggered
elsewhere.

An alternative would be to call btrfs_start_delalloc_roots() with a
number of pages different from LONG_MAX, for example matching the number
of delalloc bytes we currently have, in 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48920/">CVE-2022-48920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48920">CVE-2022-48920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229658">SUSE bug 1229658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix fault in reweight_entity

Syzbot found a GPF in reweight_entity. This has been bisected to
commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid
sched_task_group")

There is a race between sched_post_fork() and setpriority(PRIO_PGRP)
within a thread group that causes a null-ptr-deref in
reweight_entity() in CFS. The scenario is that the main process spawns
number of new threads, which then call setpriority(PRIO_PGRP, 0, -20),
wait, and exit.  For each of the new threads the copy_process() gets
invoked, which adds the new task_struct and calls sched_post_fork()
for it.

In the above scenario there is a possibility that
setpriority(PRIO_PGRP) and set_one_prio() will be called for a thread
in the group that is just being created by copy_process(), and for
which the sched_post_fork() has not been executed yet. This will
trigger a null pointer dereference in reweight_entity(), as it will
try to access the run queue pointer, which hasn't been set.

Before the mentioned change the cfs_rq pointer for the task  has been
set in sched_fork(), which is called much earlier in copy_process(),
before the new task is added to the thread_group.  Now it is done in
the sched_post_fork(), which is called after that.  To fix the issue
the remove the update_load param from the update_load param() function
and call reweight_task() only if the task flag doesn't have the
TASK_NEW flag set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48923" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: prevent copying too big compressed lzo segment

Compressed length can be corrupted to be a lot larger than memory
we have allocated for buffer.
This will cause memcpy in copy_compressed_segment to write outside
of allocated memory.

This mostly results in stuck read syscall but sometimes when using
btrfs send can get #GP

  kernel: general protection fault, probably for non-canonical address 0x841551d5c1000: 0000 [#1] PREEMPT SMP NOPTI
  kernel: CPU: 17 PID: 264 Comm: kworker/u256:7 Tainted: P           OE     5.17.0-rc2-1 #12
  kernel: Workqueue: btrfs-endio btrfs_work_helper [btrfs]
  kernel: RIP: 0010:lzo_decompress_bio (./include/linux/fortify-string.h:225 fs/btrfs/lzo.c:322 fs/btrfs/lzo.c:394) btrfs
  Code starting with the faulting instruction
  ===========================================
     0:*  48 8b 06                mov    (%rsi),%rax              &lt;-- trapping instruction
     3:   48 8d 79 08             lea    0x8(%rcx),%rdi
     7:   48 83 e7 f8             and    $0xfffffffffffffff8,%rdi
     b:   48 89 01                mov    %rax,(%rcx)
     e:   44 89 f0                mov    %r14d,%eax
    11:   48 8b 54 06 f8          mov    -0x8(%rsi,%rax,1),%rdx
  kernel: RSP: 0018:ffffb110812efd50 EFLAGS: 00010212
  kernel: RAX: 0000000000001000 RBX: 000000009ca264c8 RCX: ffff98996e6d8ff8
  kernel: RDX: 0000000000000064 RSI: 000841551d5c1000 RDI: ffffffff9500435d
  kernel: RBP: ffff989a3be856c0 R08: 0000000000000000 R09: 0000000000000000
  kernel: R10: 0000000000000000 R11: 0000000000001000 R12: ffff98996e6d8000
  kernel: R13: 0000000000000008 R14: 0000000000001000 R15: 000841551d5c1000
  kernel: FS:  0000000000000000(0000) GS:ffff98a09d640000(0000) knlGS:0000000000000000
  kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  kernel: CR2: 00001e9f984d9ea8 CR3: 000000014971a000 CR4: 00000000003506e0
  kernel: Call Trace:
  kernel:  &lt;TASK&gt;
  kernel: end_compressed_bio_read (fs/btrfs/compression.c:104 fs/btrfs/compression.c:1363 fs/btrfs/compression.c:323) btrfs
  kernel: end_workqueue_fn (fs/btrfs/disk-io.c:1923) btrfs
  kernel: btrfs_work_helper (fs/btrfs/async-thread.c:326) btrfs
  kernel: process_one_work (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:212 ./include/trace/events/workqueue.h:108 kernel/workqueue.c:2312)
  kernel: worker_thread (./include/linux/list.h:292 kernel/workqueue.c:2455)
  kernel: ? process_one_work (kernel/workqueue.c:2397)
  kernel: kthread (kernel/kthread.c:377)
  kernel: ? kthread_complete_and_exit (kernel/kthread.c:332)
  kernel: ret_from_fork (arch/x86/entry/entry_64.S:301)
  kernel:  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229663">SUSE bug 1229663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48924" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: int340x: fix memory leak in int3400_notify()

It is easy to hit the below memory leaks in my TigerLake platform:

unreferenced object 0xffff927c8b91dbc0 (size 32):
  comm "kworker/0:2", pid 112, jiffies 4294893323 (age 83.604s)
  hex dump (first 32 bytes):
    4e 41 4d 45 3d 49 4e 54 33 34 30 30 20 54 68 65  NAME=INT3400 The
    72 6d 61 6c 00 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  rmal.kkkkkkkkkk.
  backtrace:
    [&lt;ffffffff9c502c3e&gt;] __kmalloc_track_caller+0x2fe/0x4a0
    [&lt;ffffffff9c7b7c15&gt;] kvasprintf+0x65/0xd0
    [&lt;ffffffff9c7b7d6e&gt;] kasprintf+0x4e/0x70
    [&lt;ffffffffc04cb662&gt;] int3400_notify+0x82/0x120 [int3400_thermal]
    [&lt;ffffffff9c8b7358&gt;] acpi_ev_notify_dispatch+0x54/0x71
    [&lt;ffffffff9c88f1a7&gt;] acpi_os_execute_deferred+0x17/0x30
    [&lt;ffffffff9c2c2c0a&gt;] process_one_work+0x21a/0x3f0
    [&lt;ffffffff9c2c2e2a&gt;] worker_thread+0x4a/0x3b0
    [&lt;ffffffff9c2cb4dd&gt;] kthread+0xfd/0x130
    [&lt;ffffffff9c201c1f&gt;] ret_from_fork+0x1f/0x30

Fix it by calling kfree() accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48925" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Do not change route.addr.src_addr outside state checks

If the state is not idle then resolve_prepare_src() should immediately
fail and no change to global state should happen. However, it
unconditionally overwrites the src_addr trying to build a temporary any
address.

For instance if the state is already RDMA_CM_LISTEN then this will corrupt
the src_addr and would cause the test in cma_cancel_operation():

           if (cma_any_addr(cma_src_addr(id_priv)) &amp;&amp; !id_priv-&gt;cma_dev)

Which would manifest as this trace from syzkaller:

  BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 lib/list_debug.c:26
  Read of size 8 at addr ffff8881546491e0 by task syz-executor.1/32204

  CPU: 1 PID: 32204 Comm: syz-executor.1 Not tainted 5.12.0-rc8-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:79 [inline]
   dump_stack+0x141/0x1d7 lib/dump_stack.c:120
   print_address_description.constprop.0.cold+0x5b/0x2f8 mm/kasan/report.c:232
   __kasan_report mm/kasan/report.c:399 [inline]
   kasan_report.cold+0x7c/0xd8 mm/kasan/report.c:416
   __list_add_valid+0x93/0xa0 lib/list_debug.c:26
   __list_add include/linux/list.h:67 [inline]
   list_add_tail include/linux/list.h:100 [inline]
   cma_listen_on_all drivers/infiniband/core/cma.c:2557 [inline]
   rdma_listen+0x787/0xe00 drivers/infiniband/core/cma.c:3751
   ucma_listen+0x16a/0x210 drivers/infiniband/core/ucma.c:1102
   ucma_write+0x259/0x350 drivers/infiniband/core/ucma.c:1732
   vfs_write+0x28e/0xa30 fs/read_write.c:603
   ksys_write+0x1ee/0x250 fs/read_write.c:658
   do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
   entry_SYSCALL_64_after_hwframe+0x44/0xae

This is indicating that an rdma_id_private was destroyed without doing
cma_cancel_listens().

Instead of trying to re-use the src_addr memory to indirectly create an
any address derived from the dst build one explicitly on the stack and
bind to that as any other normal flow would do. rdma_bind_addr() will copy
it over the src_addr once it knows the state is valid.

This is similar to commit bc0bdc5afaa7 ("RDMA/cma: Do not change
route.addr.src_addr.ss_family")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48926</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48926" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: rndis: add spinlock for rndis response list

There's no lock for rndis response list. It could cause list corruption
if there're two different list_add at the same time like below.
It's better to add in rndis_add_response / rndis_free_response
/ rndis_get_next_response to prevent any race condition on response list.

[  361.894299] [1:   irq/191-dwc3:16979] list_add corruption.
next-&gt;prev should be prev (ffffff80651764d0),
but was ffffff883dc36f80. (next=ffffff80651764d0).

[  361.904380] [1:   irq/191-dwc3:16979] Call trace:
[  361.904391] [1:   irq/191-dwc3:16979]  __list_add_valid+0x74/0x90
[  361.904401] [1:   irq/191-dwc3:16979]  rndis_msg_parser+0x168/0x8c0
[  361.904409] [1:   irq/191-dwc3:16979]  rndis_command_complete+0x24/0x84
[  361.904417] [1:   irq/191-dwc3:16979]  usb_gadget_giveback_request+0x20/0xe4
[  361.904426] [1:   irq/191-dwc3:16979]  dwc3_gadget_giveback+0x44/0x60
[  361.904434] [1:   irq/191-dwc3:16979]  dwc3_ep0_complete_data+0x1e8/0x3a0
[  361.904442] [1:   irq/191-dwc3:16979]  dwc3_ep0_interrupt+0x29c/0x3dc
[  361.904450] [1:   irq/191-dwc3:16979]  dwc3_process_event_entry+0x78/0x6cc
[  361.904457] [1:   irq/191-dwc3:16979]  dwc3_process_event_buf+0xa0/0x1ec
[  361.904465] [1:   irq/191-dwc3:16979]  dwc3_thread_interrupt+0x34/0x5c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48927</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48927" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: tsc2046: fix memory corruption by preventing array overflow

On one side we have indio_dev-&gt;num_channels includes all physical channels +
timestamp channel. On other side we have an array allocated only for
physical channels. So, fix memory corruption by ARRAY_SIZE() instead of
num_channels variable.

Note the first case is a cleanup rather than a fix as the software
timestamp channel bit in active_scanmask is never set by the IIO core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48928</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48928" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: men_z188_adc: Fix a resource leak in an error handling path

If iio_device_register() fails, a previous ioremap() is left unbalanced.

Update the error handling path and add the missing iounmap() call, as
already done in the remove function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix crash due to out of bounds access into reg2btf_ids.

When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added
kfunc support, it defined reg2btf_ids as a cheap way to translate the verifier
reg type to the appropriate btf_vmlinux BTF ID, however
commit c25b2ae13603 ("bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL")
moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to after
the base register types, and defined other variants using type flag
composition. However, now, the direct usage of reg-&gt;type to index into
reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence lead to
out of bounds access and kernel crash on dereference of bad pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48930" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/ib_srp: Fix a deadlock

Remove the flush_workqueue(system_long_wq) call since flushing
system_long_wq is deadlock-prone and since that call is redundant with a
preceding cancel_work_sync()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48931" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

configfs: fix a race in configfs_{,un}register_subsystem()

When configfs_register_subsystem() or configfs_unregister_subsystem()
is executing link_group() or unlink_group(),
it is possible that two processes add or delete list concurrently.
Some unfortunate interleavings of them can cause kernel panic.

One of cases is:
A --&gt; B --&gt; C --&gt; D
A &lt;-- B &lt;-- C &lt;-- D

     delete list_head *B        |      delete list_head *C
--------------------------------|-----------------------------------
configfs_unregister_subsystem   |   configfs_unregister_subsystem
  unlink_group                  |     unlink_group
    unlink_obj                  |       unlink_obj
      list_del_init             |         list_del_init
        __list_del_entry        |           __list_del_entry
          __list_del            |             __list_del
            // next == C        |
            next-&gt;prev = prev   |
                                |               next-&gt;prev = prev
            prev-&gt;next = next   |
                                |                 // prev == B
                                |                 prev-&gt;next = next

Fix this by adding mutex when calling link_group() or unlink_group(),
but parent configfs_subsystem is NULL when config_item is root.
So I create a mutex configfs_subsystem_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48932" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte

When adding a rule with 32 destinations, we hit the following out-of-band
access issue:

  BUG: KASAN: slab-out-of-bounds in mlx5_cmd_dr_create_fte+0x18ee/0x1e70

This patch fixes the issue by both increasing the allocated buffers to
accommodate for the needed actions and by checking the number of actions
to prevent this issue when a rule with too many actions is provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()

ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX)
inclusive.
So NFP_MAX_MAC_INDEX (0xff) is a valid id.

In order for the error handling path to work correctly, the 'invalid'
value for 'ida_idx' should not be in the 0..NFP_MAX_MAC_INDEX range,
inclusive.

So set it to -1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48935</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48935" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unregister flowtable hooks on netns exit

Unregister flowtable hooks before they are releases via
nf_tables_flowtable_destroy() otherwise hook core reports UAF.

BUG: KASAN: use-after-free in nf_hook_entries_grow+0x5a7/0x700 net/netfilter/core.c:142 net/netfilter/core.c:142
Read of size 4 at addr ffff8880736f7438 by task syz-executor579/3666

CPU: 0 PID: 3666 Comm: syz-executor579 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 __dump_stack lib/dump_stack.c:88 [inline] lib/dump_stack.c:106
 dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 lib/dump_stack.c:106
 print_address_description+0x65/0x380 mm/kasan/report.c:247 mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 __kasan_report mm/kasan/report.c:433 [inline] mm/kasan/report.c:450
 kasan_report+0x19a/0x1f0 mm/kasan/report.c:450 mm/kasan/report.c:450
 nf_hook_entries_grow+0x5a7/0x700 net/netfilter/core.c:142 net/netfilter/core.c:142
 __nf_register_net_hook+0x27e/0x8d0 net/netfilter/core.c:429 net/netfilter/core.c:429
 nf_register_net_hook+0xaa/0x180 net/netfilter/core.c:571 net/netfilter/core.c:571
 nft_register_flowtable_net_hooks+0x3c5/0x730 net/netfilter/nf_tables_api.c:7232 net/netfilter/nf_tables_api.c:7232
 nf_tables_newflowtable+0x2022/0x2cf0 net/netfilter/nf_tables_api.c:7430 net/netfilter/nf_tables_api.c:7430
 nfnetlink_rcv_batch net/netfilter/nfnetlink.c:513 [inline]
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline]
 nfnetlink_rcv_batch net/netfilter/nfnetlink.c:513 [inline] net/netfilter/nfnetlink.c:652
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline] net/netfilter/nfnetlink.c:652
 nfnetlink_rcv+0x10e6/0x2550 net/netfilter/nfnetlink.c:652 net/netfilter/nfnetlink.c:652

__nft_release_hook() calls nft_unregister_flowtable_net_hooks() which
only unregisters the hooks, then after RCU grace period, it is
guaranteed that no packets add new entries to the flowtable (no flow
offload rules and flowtable hooks are reachable from packet path), so it
is safe to call nf_flow_table_free() which cleans up the remaining
entries from the flowtable (both software and hardware) and it unbinds
the flow_block.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48937</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48937" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: add a schedule point in io_add_buffers()

Looping ~65535 times doing kmalloc() calls can trigger soft lockups,
especially with DEBUG features (like KASAN).

[  253.536212] watchdog: BUG: soft lockup - CPU#64 stuck for 26s! [b219417889:12575]
[  253.544433] Modules linked in: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O)
[  253.544451] CPU: 64 PID: 12575 Comm: b219417889 Tainted: G S         O      5.17.0-smp-DEV #801
[  253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98)
[  253.544464] Code: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb &lt;48&gt; c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40
[  253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246
[  253.544471] RAX: 1ffff1105b175e00 RBX: ffffffffa13ef09a RCX: 00000000a13ef001
[  253.544474] RDX: ffffffffa13ef09a RSI: ffff8882d8baf558 RDI: ffffffffa13ef09a
[  253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 0000000000000004
[  253.544479] R10: ffff8882d8baf5e8 R11: ffffffffa0d59a50 R12: ffff8882eab20380
[  253.544481] R13: ffffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0
[  253.544483] FS:  00000000016d3380(0000) GS:ffff88af48c00000(0000) knlGS:0000000000000000
[  253.544486] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  253.544488] CR2: 00000000004af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0
[  253.544491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  253.544492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  253.544494] Call Trace:
[  253.544496]  &lt;TASK&gt;
[  253.544498] ? io_queue_sqe (fs/io_uring.c:7143)
[  253.544505] __kernel_text_address (kernel/extable.c:78)
[  253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19)
[  253.544514] arch_stack_walk (arch/x86/kernel/stacktrace.c:27)
[  253.544517] ? io_queue_sqe (fs/io_uring.c:7143)
[  253.544521] stack_trace_save (kernel/stacktrace.c:123)
[  253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)
[  253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)
[  253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524)
[  253.544535] ? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)
[  253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)
[  253.544544] ? __io_queue_sqe (fs/io_uring.c:?)
[  253.544551] __kasan_kmalloc (mm/kasan/common.c:524)
[  253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)
[  253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)
[  253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)
[  253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)
[  253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)
[  253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546)
[  253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078)
[  253.544578] ? io_submit_sqes (fs/io_uring.c:7441)
[  253.544581] ? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096)
[  253.544584] ? __x64_sys_io_uring_enter (fs/io_uring.c:10096)
[  253.544587] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
[  253.544590] ? entry_SYSCALL_64_after_hwframe (??:?)
[  253.544596] __io_queue_sqe (fs/io_uring.c:?)
[  253.544600] io_queue_sqe (fs/io_uring.c:7143)
[  253.544603] io_submit_sqe (fs/io_uring.c:?)
[  253.544608] io_submit_sqes (fs/io_uring.c:?)
[  253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

CDC-NCM: avoid overflow in sanity checking

A broken device may give an extreme offset like 0xFFF0
and a reasonable length for a fragment. In the sanity
check as formulated now, this will create an integer
overflow, defeating the sanity check. Both offset
and offset + len need to be checked in such a manner
that no overflow can occur.
And those quantities should be unsigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48939" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add schedule points in batch ops

syzbot reported various soft lockups caused by bpf batch operations.

 INFO: task kworker/1:1:27 blocked for more than 140 seconds.
 INFO: task hung in rcu_barrier

Nothing prevents batch ops to process huge amount of data,
we need to add schedule points in them.

Note that maybe_wait_bpf_programs(map) calls from
generic_map_delete_batch() can be factorized by moving
the call after the loop.

This will be done later in -next tree once we get this fix merged,
unless there is strong opinion doing this optimization sooner.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229616">SUSE bug 1229616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48940</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48940" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48940" ref_url="https://www.suse.com/security/cve/CVE-2022-48940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix crash due to incorrect copy_map_value

When both bpf_spin_lock and bpf_timer are present in a BPF map value,
copy_map_value needs to skirt both objects when copying a value into and
out of the map. However, the current code does not set both s_off and
t_off in copy_map_value, which leads to a crash when e.g. bpf_spin_lock
is placed in map value with bpf_timer, as bpf_map_update_elem call will
be able to overwrite the other timer object.

When the issue is not fixed, an overwriting can produce the following
splat:

[root@(none) bpf]# ./test_progs -t timer_crash
[   15.930339] bpf_testmod: loading out-of-tree module taints kernel.
[   16.037849] ==================================================================
[   16.038458] BUG: KASAN: user-memory-access in __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.038944] Write of size 8 at addr 0000000000043ec0 by task test_progs/325
[   16.039399]
[   16.039514] CPU: 0 PID: 325 Comm: test_progs Tainted: G           OE     5.16.0+ #278
[   16.039983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0-1 04/01/2014
[   16.040485] Call Trace:
[   16.040645]  &lt;TASK&gt;
[   16.040805]  dump_stack_lvl+0x59/0x73
[   16.041069]  ? __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.041427]  kasan_report.cold+0x116/0x11b
[   16.041673]  ? __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.042040]  __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.042328]  ? memcpy+0x39/0x60
[   16.042552]  ? pv_hash+0xd0/0xd0
[   16.042785]  ? lockdep_hardirqs_off+0x95/0xd0
[   16.043079]  __bpf_spin_lock_irqsave+0xdf/0xf0
[   16.043366]  ? bpf_get_current_comm+0x50/0x50
[   16.043608]  ? jhash+0x11a/0x270
[   16.043848]  bpf_timer_cancel+0x34/0xe0
[   16.044119]  bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81
[   16.044500]  bpf_trampoline_6442477838_0+0x36/0x1000
[   16.044836]  __x64_sys_nanosleep+0x5/0x140
[   16.045119]  do_syscall_64+0x59/0x80
[   16.045377]  ? lock_is_held_type+0xe4/0x140
[   16.045670]  ? irqentry_exit_to_user_mode+0xa/0x40
[   16.046001]  ? mark_held_locks+0x24/0x90
[   16.046287]  ? asm_exc_page_fault+0x1e/0x30
[   16.046569]  ? asm_exc_page_fault+0x8/0x30
[   16.046851]  ? lockdep_hardirqs_on+0x7e/0x100
[   16.047137]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   16.047405] RIP: 0033:0x7f9e4831718d
[   16.047602] Code: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48
[   16.048764] RSP: 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023
[   16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d
[   16.049747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0
[   16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0
[   16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30
[   16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   16.051608]  &lt;/TASK&gt;
[   16.051762] ==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48940/">CVE-2022-48940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48940">CVE-2022-48940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229615">SUSE bug 1229615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48941</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48941" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix concurrent reset and removal of VFs

Commit c503e63200c6 ("ice: Stop processing VF messages during teardown")
introduced a driver state flag, ICE_VF_DEINIT_IN_PROGRESS, which is
intended to prevent some issues with concurrently handling messages from
VFs while tearing down the VFs.

This change was motivated by crashes caused while tearing down and
bringing up VFs in rapid succession.

It turns out that the fix actually introduces issues with the VF driver
caused because the PF no longer responds to any messages sent by the VF
during its .remove routine. This results in the VF potentially removing
its DMA memory before the PF has shut down the device queues.

Additionally, the fix doesn't actually resolve concurrency issues within
the ice driver. It is possible for a VF to initiate a reset just prior
to the ice driver removing VFs. This can result in the remove task
concurrently operating while the VF is being reset. This results in
similar memory corruption and panics purportedly fixed by that commit.

Fix this concurrency at its root by protecting both the reset and
removal flows using the existing VF cfg_lock. This ensures that we
cannot remove the VF while any outstanding critical tasks such as a
virtchnl message or a reset are occurring.

This locking change also fixes the root cause originally fixed by commit
c503e63200c6 ("ice: Stop processing VF messages during teardown"), so we
can simply revert it.

Note that I kept these two changes together because simply reverting the
original commit alone would leave the driver vulnerable to worse race
conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48942</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: Handle failure to register sensor with thermal zone correctly

If an attempt is made to a sensor with a thermal zone and it fails,
the call to devm_thermal_zone_of_sensor_register() may return -ENODEV.
This may result in crashes similar to the following.

Unable to handle kernel NULL pointer dereference at virtual address 00000000000003cd
...
Internal error: Oops: 96000021 [#1] PREEMPT SMP
...
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mutex_lock+0x18/0x60
lr : thermal_zone_device_update+0x40/0x2e0
sp : ffff800014c4fc60
x29: ffff800014c4fc60 x28: ffff365ee3f6e000 x27: ffffdde218426790
x26: ffff365ee3f6e000 x25: 0000000000000000 x24: ffff365ee3f6e000
x23: ffffdde218426870 x22: ffff365ee3f6e000 x21: 00000000000003cd
x20: ffff365ee8bf3308 x19: ffffffffffffffed x18: 0000000000000000
x17: ffffdde21842689c x16: ffffdde1cb7a0b7c x15: 0000000000000040
x14: ffffdde21a4889a0 x13: 0000000000000228 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000001120000 x7 : 0000000000000001 x6 : 0000000000000000
x5 : 0068000878e20f07 x4 : 0000000000000000 x3 : 00000000000003cd
x2 : ffff365ee3f6e000 x1 : 0000000000000000 x0 : 00000000000003cd
Call trace:
 mutex_lock+0x18/0x60
 hwmon_notify_event+0xfc/0x110
 0xffffdde1cb7a0a90
 0xffffdde1cb7a0b7c
 irq_thread_fn+0x2c/0xa0
 irq_thread+0x134/0x240
 kthread+0x178/0x190
 ret_from_fork+0x10/0x20
Code: d503201f d503201f d2800001 aa0103e4 (c8e47c02)

Jon Hunter reports that the exact call sequence is:

hwmon_notify_event()
  --&gt; hwmon_thermal_notify()
    --&gt; thermal_zone_device_update()
      --&gt; update_temperature()
        --&gt; mutex_lock()

The hwmon core needs to handle all errors returned from calls
to devm_thermal_zone_of_sensor_register(). If the call fails
with -ENODEV, report that the sensor was not attached to a
thermal zone  but continue to register the hwmon device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48943</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: make apf token non-zero to fix bug

In current async pagefault logic, when a page is ready, KVM relies on
kvm_arch_can_dequeue_async_page_present() to determine whether to deliver
a READY event to the Guest. This function test token value of struct
kvm_vcpu_pv_apf_data, which must be reset to zero by Guest kernel when a
READY event is finished by Guest. If value is zero meaning that a READY
event is done, so the KVM can deliver another.
But the kvm_arch_setup_async_pf() may produce a valid token with zero
value, which is confused with previous mention and may lead the loss of
this READY event.

This bug may cause task blocked forever in Guest:
 INFO: task stress:7532 blocked for more than 1254 seconds.
       Not tainted 5.10.0 #16
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:stress          state:D stack:    0 pid: 7532 ppid:  1409
 flags:0x00000080
 Call Trace:
  __schedule+0x1e7/0x650
  schedule+0x46/0xb0
  kvm_async_pf_task_wait_schedule+0xad/0xe0
  ? exit_to_user_mode_prepare+0x60/0x70
  __kvm_handle_async_pf+0x4f/0xb0
  ? asm_exc_page_fault+0x8/0x30
  exc_page_fault+0x6f/0x110
  ? asm_exc_page_fault+0x8/0x30
  asm_exc_page_fault+0x1e/0x30
 RIP: 0033:0x402d00
 RSP: 002b:00007ffd31912500 EFLAGS: 00010206
 RAX: 0000000000071000 RBX: ffffffffffffffff RCX: 00000000021a32b0
 RDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0
 RBP: 00000000021262b0 R08: 0000000000000003 R09: 0000000000000086
 R10: 00000000000000eb R11: 00007fefbdf2baa0 R12: 0000000000000000
 R13: 0000000000000002 R14: 000000000007d000 R15: 0000000000001000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48944</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48944" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: Fix yet more sched_fork() races

Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an
invalid sched_task_group") fixed a fork race vs cgroup, it opened up a
race vs syscalls by not placing the task on the runqueue before it
gets exposed through the pidhash.

Commit 13765de8148f ("sched/fair: Fix fault in reweight_entity") is
trying to fix a single instance of this, instead fix the whole class
of issues, effectively reverting this commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48945" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vivid: fix compose size exceed boundary

syzkaller found a bug:

 BUG: unable to handle page fault for address: ffffc9000a3b1000
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0
 Oops: 0002 [#1] PREEMPT SMP
 CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
 RIP: 0010:memcpy_erms+0x6/0x10
[...]
 Call Trace:
  &lt;TASK&gt;
  ? tpg_fill_plane_buffer+0x856/0x15b0
  vivid_fillbuff+0x8ac/0x1110
  vivid_thread_vid_cap_tick+0x361/0xc90
  vivid_thread_vid_cap+0x21a/0x3a0
  kthread+0x143/0x180
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;

This is because we forget to check boundary after adjust compose-&gt;height
int V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem
for this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48946</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48946" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48946" ref_url="https://www.suse.com/security/cve/CVE-2022-48946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Fix preallocation discarding at indirect extent boundary

When preallocation extent is the first one in the extent block, the
code would corrupt extent tree header instead. Fix the problem and use
udf_delete_aext() for deleting extent to avoid some code duplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48946/">CVE-2022-48946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48946">CVE-2022-48946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231888">SUSE bug 1231888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48947</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48947" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix u8 overflow

By keep sending L2CAP_CONF_REQ packets, chan-&gt;num_conf_rsp increases
multiple times and eventually it will wrap around the maximum number
(i.e., 255).
This patch prevents this by adding a boundary check with
L2CAP_MAX_CONF_RSP

Btmon log:
Bluetooth monitor ver 5.64
= Note: Linux version 6.1.0-rc2 (x86_64)                               0.264594
= Note: Bluetooth subsystem version 2.22                               0.264636
@ MGMT Open: btmon (privileged) version 1.22                  {0x0001} 0.272191
= New Index: 00:00:00:00:00:00 (Primary,Virtual,hci0)          [hci0] 13.877604
@ RAW Open: 9496 (privileged) version 2.22                   {0x0002} 13.890741
= Open Index: 00:00:00:00:00:00                                [hci0] 13.900426
(...)
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 1033             #32 [hci0] 14.273106
        invalid packet size (12 != 1033)
        08 00 01 00 02 01 04 00 01 10 ff ff              ............
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 1547             #33 [hci0] 14.273561
        invalid packet size (14 != 1547)
        0a 00 01 00 04 01 06 00 40 00 00 00 00 00        ........@.....
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 2061             #34 [hci0] 14.274390
        invalid packet size (16 != 2061)
        0c 00 01 00 04 01 08 00 40 00 00 00 00 00 00 04  ........@.......
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 2061             #35 [hci0] 14.274932
        invalid packet size (16 != 2061)
        0c 00 01 00 04 01 08 00 40 00 00 00 07 00 03 00  ........@.......
= bluetoothd: Bluetooth daemon 5.43                                   14.401828
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 1033             #36 [hci0] 14.275753
        invalid packet size (12 != 1033)
        08 00 01 00 04 01 04 00 40 00 00 00              ........@...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48948</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48948" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48948" ref_url="https://www.suse.com/security/cve/CVE-2022-48948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: uvc: Prevent buffer overflow in setup handler

Setup function uvc_function_setup permits control transfer
requests with up to 64 bytes of payload (UVC_MAX_REQUEST_SIZE),
data stage handler for OUT transfer uses memcpy to copy req-&gt;actual
bytes to uvc_event-&gt;data.data array of size 60. This may result
in an overflow of 4 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48948/">CVE-2022-48948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48948">CVE-2022-48948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231896">SUSE bug 1231896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48949</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48949" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48949" ref_url="https://www.suse.com/security/cve/CVE-2022-48949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Initialize mailbox message for VF reset

When a MAC address is not assigned to the VF, that portion of the message
sent to the VF is not set. The memory, however, is allocated from the
stack meaning that information may be leaked to the VM. Initialize the
message buffer to 0 so that no information is passed to the VM in this
case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48949/">CVE-2022-48949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48949">CVE-2022-48949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231897">SUSE bug 1231897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48951</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48951" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48951" ref_url="https://www.suse.com/security/cve/CVE-2022-48951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()

The bounds checks in snd_soc_put_volsw_sx() are only being applied to the
first channel, meaning it is possible to write out of bounds values to the
second channel in stereo controls. Add appropriate checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48951/">CVE-2022-48951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48951">CVE-2022-48951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231929">SUSE bug 1231929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48953" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48953" ref_url="https://www.suse.com/security/cve/CVE-2022-48953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: cmos: Fix event handler registration ordering issue

Because acpi_install_fixed_event_handler() enables the event
automatically on success, it is incorrect to call it before the
handler routine passed to it is ready to handle events.

Unfortunately, the rtc-cmos driver does exactly the incorrect thing
by calling cmos_wake_setup(), which passes rtc_handler() to
acpi_install_fixed_event_handler(), before cmos_do_probe(), because
rtc_handler() uses dev_get_drvdata() to get to the cmos object
pointer and the driver data pointer is only populated in
cmos_do_probe().

This leads to a NULL pointer dereference in rtc_handler() on boot
if the RTC fixed event happens to be active at the init time.

To address this issue, change the initialization ordering of the
driver so that cmos_wake_setup() is always called after a successful
cmos_do_probe() call.

While at it, change cmos_pnp_probe() to call cmos_do_probe() after
the initial if () statement used for computing the IRQ argument to
be passed to cmos_do_probe() which is cleaner than calling it in
each branch of that if () (local variable "irq" can be of type int,
because it is passed to that function as an argument of type int).

Note that commit 6492fed7d8c9 ("rtc: rtc-cmos: Do not check
ACPI_FADT_LOW_POWER_S0") caused this issue to affect a larger number
of systems, because previously it only affected systems with
ACPI_FADT_LOW_POWER_S0 set, but it is present regardless of that
commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48953/">CVE-2022-48953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48953">CVE-2022-48953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231941">SUSE bug 1231941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48954</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48954" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix use-after-free in hsci

KASAN found that addr was dereferenced after br2dev_event_work was freed.

==================================================================
BUG: KASAN: use-after-free in qeth_l2_br2dev_worker+0x5ba/0x6b0
Read of size 1 at addr 00000000fdcea440 by task kworker/u760:4/540
CPU: 17 PID: 540 Comm: kworker/u760:4 Tainted: G            E      6.1.0-20221128.rc7.git1.5aa3bed4ce83.300.fc36.s390x+kasan #1
Hardware name: IBM 8561 T01 703 (LPAR)
Workqueue: 0.0.8000_event qeth_l2_br2dev_worker
Call Trace:
 [&lt;000000016944d4ce&gt;] dump_stack_lvl+0xc6/0xf8
 [&lt;000000016942cd9c&gt;] print_address_description.constprop.0+0x34/0x2a0
 [&lt;000000016942d118&gt;] print_report+0x110/0x1f8
 [&lt;0000000167a7bd04&gt;] kasan_report+0xfc/0x128
 [&lt;000000016938d79a&gt;] qeth_l2_br2dev_worker+0x5ba/0x6b0
 [&lt;00000001673edd1e&gt;] process_one_work+0x76e/0x1128
 [&lt;00000001673ee85c&gt;] worker_thread+0x184/0x1098
 [&lt;000000016740718a&gt;] kthread+0x26a/0x310
 [&lt;00000001672c606a&gt;] __ret_from_fork+0x8a/0xe8
 [&lt;00000001694711da&gt;] ret_from_fork+0xa/0x40
Allocated by task 108338:
 kasan_save_stack+0x40/0x68
 kasan_set_track+0x36/0x48
 __kasan_kmalloc+0xa0/0xc0
 qeth_l2_switchdev_event+0x25a/0x738
 atomic_notifier_call_chain+0x9c/0xf8
 br_switchdev_fdb_notify+0xf4/0x110
 fdb_notify+0x122/0x180
 fdb_add_entry.constprop.0.isra.0+0x312/0x558
 br_fdb_add+0x59e/0x858
 rtnl_fdb_add+0x58a/0x928
 rtnetlink_rcv_msg+0x5f8/0x8d8
 netlink_rcv_skb+0x1f2/0x408
 netlink_unicast+0x570/0x790
 netlink_sendmsg+0x752/0xbe0
 sock_sendmsg+0xca/0x110
 ____sys_sendmsg+0x510/0x6a8
 ___sys_sendmsg+0x12a/0x180
 __sys_sendmsg+0xe6/0x168
 __do_sys_socketcall+0x3c8/0x468
 do_syscall+0x22c/0x328
 __do_syscall+0x94/0xf0
 system_call+0x82/0xb0
Freed by task 540:
 kasan_save_stack+0x40/0x68
 kasan_set_track+0x36/0x48
 kasan_save_free_info+0x4c/0x68
 ____kasan_slab_free+0x14e/0x1a8
 __kasan_slab_free+0x24/0x30
 __kmem_cache_free+0x168/0x338
 qeth_l2_br2dev_worker+0x154/0x6b0
 process_one_work+0x76e/0x1128
 worker_thread+0x184/0x1098
 kthread+0x26a/0x310
 __ret_from_fork+0x8a/0xe8
 ret_from_fork+0xa/0x40
Last potentially related work creation:
 kasan_save_stack+0x40/0x68
 __kasan_record_aux_stack+0xbe/0xd0
 insert_work+0x56/0x2e8
 __queue_work+0x4ce/0xd10
 queue_work_on+0xf4/0x100
 qeth_l2_switchdev_event+0x520/0x738
 atomic_notifier_call_chain+0x9c/0xf8
 br_switchdev_fdb_notify+0xf4/0x110
 fdb_notify+0x122/0x180
 fdb_add_entry.constprop.0.isra.0+0x312/0x558
 br_fdb_add+0x59e/0x858
 rtnl_fdb_add+0x58a/0x928
 rtnetlink_rcv_msg+0x5f8/0x8d8
 netlink_rcv_skb+0x1f2/0x408
 netlink_unicast+0x570/0x790
 netlink_sendmsg+0x752/0xbe0
 sock_sendmsg+0xca/0x110
 ____sys_sendmsg+0x510/0x6a8
 ___sys_sendmsg+0x12a/0x180
 __sys_sendmsg+0xe6/0x168
 __do_sys_socketcall+0x3c8/0x468
 do_syscall+0x22c/0x328
 __do_syscall+0x94/0xf0
 system_call+0x82/0xb0
Second to last potentially related work creation:
 kasan_save_stack+0x40/0x68
 __kasan_record_aux_stack+0xbe/0xd0
 kvfree_call_rcu+0xb2/0x760
 kernfs_unlink_open_file+0x348/0x430
 kernfs_fop_release+0xc2/0x320
 __fput+0x1ae/0x768
 task_work_run+0x1bc/0x298
 exit_to_user_mode_prepare+0x1a0/0x1a8
 __do_syscall+0x94/0xf0
 system_call+0x82/0xb0
The buggy address belongs to the object at 00000000fdcea400
 which belongs to the cache kmalloc-96 of size 96
The buggy address is located 64 bytes inside of
 96-byte region [00000000fdcea400, 00000000fdcea460)
The buggy address belongs to the physical page:
page:000000005a9c26e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfdcea
flags: 0x3ffff00000000200(slab|node=0|zone=1|lastcpupid=0x1ffff)
raw: 3ffff00000000200 0000000000000000 0000000100000122 000000008008cc00
raw: 0000000000000000 0020004100000000 ffffffff00000001 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
 00000000fdcea300: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
 00000000fdcea380: fb fb fb fb fb fb f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48955</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48955" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: thunderbolt: fix memory leak in tbnet_open()

When tb_ring_alloc_rx() failed in tbnet_open(), ida that allocated in
tb_xdomain_alloc_out_hopid() is not released. Add
tb_xdomain_release_out_hopid() to the error path to release ida.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48956</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48956" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48956" ref_url="https://www.suse.com/security/cve/CVE-2022-48956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid use-after-free in ip6_fragment()

Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers.

It seems to not be always true, at least for UDP stack.

syzbot reported:

BUG: KASAN: use-after-free in ip6_dst_idev include/net/ip6_fib.h:245 [inline]
BUG: KASAN: use-after-free in ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951
Read of size 8 at addr ffff88801d403e80 by task syz-executor.3/7618

CPU: 1 PID: 7618 Comm: syz-executor.3 Not tainted 6.1.0-rc6-syzkaller-00012-g4312098baf37 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x15e/0x45d mm/kasan/report.c:395
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
 ip6_dst_idev include/net/ip6_fib.h:245 [inline]
 ip6_fragment+0x2724/0x2770 net/ipv6/ip6_output.c:951
 __ip6_finish_output net/ipv6/ip6_output.c:193 [inline]
 ip6_finish_output+0x9a3/0x1170 net/ipv6/ip6_output.c:206
 NF_HOOK_COND include/linux/netfilter.h:291 [inline]
 ip6_output+0x1f1/0x540 net/ipv6/ip6_output.c:227
 dst_output include/net/dst.h:445 [inline]
 ip6_local_out+0xb3/0x1a0 net/ipv6/output_core.c:161
 ip6_send_skb+0xbb/0x340 net/ipv6/ip6_output.c:1966
 udp_v6_send_skb+0x82a/0x18a0 net/ipv6/udp.c:1286
 udp_v6_push_pending_frames+0x140/0x200 net/ipv6/udp.c:1313
 udpv6_sendmsg+0x18da/0x2c80 net/ipv6/udp.c:1606
 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0xd3/0x120 net/socket.c:734
 sock_write_iter+0x295/0x3d0 net/socket.c:1108
 call_write_iter include/linux/fs.h:2191 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x9ed/0xdd0 fs/read_write.c:584
 ksys_write+0x1ec/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fde3588c0d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fde365b6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fde359ac050 RCX: 00007fde3588c0d9
RDX: 000000000000ffdc RSI: 00000000200000c0 RDI: 000000000000000a
RBP: 00007fde358e7ae9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fde35acfb1f R14: 00007fde365b6300 R15: 0000000000022000
 &lt;/TASK&gt;

Allocated by task 7618:
 kasan_save_stack+0x22/0x40 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x82/0x90 mm/kasan/common.c:325
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slab.h:737 [inline]
 slab_alloc_node mm/slub.c:3398 [inline]
 slab_alloc mm/slub.c:3406 [inline]
 __kmem_cache_alloc_lru mm/slub.c:3413 [inline]
 kmem_cache_alloc+0x2b4/0x3d0 mm/slub.c:3422
 dst_alloc+0x14a/0x1f0 net/core/dst.c:92
 ip6_dst_alloc+0x32/0xa0 net/ipv6/route.c:344
 ip6_rt_pcpu_alloc net/ipv6/route.c:1369 [inline]
 rt6_make_pcpu_route net/ipv6/route.c:1417 [inline]
 ip6_pol_route+0x901/0x1190 net/ipv6/route.c:2254
 pol_lookup_func include/net/ip6_fib.h:582 [inline]
 fib6_rule_lookup+0x52e/0x6f0 net/ipv6/fib6_rules.c:121
 ip6_route_output_flags_noref+0x2e6/0x380 net/ipv6/route.c:2625
 ip6_route_output_flags+0x76/0x320 net/ipv6/route.c:2638
 ip6_route_output include/net/ip6_route.h:98 [inline]
 ip6_dst_lookup_tail+0x5ab/0x1620 net/ipv6/ip6_output.c:1092
 ip6_dst_lookup_flow+0x90/0x1d0 net/ipv6/ip6_output.c:1222
 ip6_sk_dst_lookup_flow+0x553/0x980 net/ipv6/ip6_output.c:1260
 udpv6_sendmsg+0x151d/0x2c80 net/ipv6/udp.c:1554
 inet6_sendmsg+0x9d/0xe0 net/ipv6/af_inet6.c:665
 sock_sendmsg_nosec n
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48956/">CVE-2022-48956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48956">CVE-2022-48956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231893">SUSE bug 1231893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232799">SUSE bug 1232799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48957</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48957" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48957" ref_url="https://www.suse.com/security/cve/CVE-2022-48957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()

The cmd_buff needs to be freed when error happened in
dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48957/">CVE-2022-48957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48957">CVE-2022-48957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231973">SUSE bug 1231973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48958</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48958" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48958" ref_url="https://www.suse.com/security/cve/CVE-2022-48958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: aeroflex: fix potential skb leak in greth_init_rings()

The greth_init_rings() function won't free the newly allocated skb when
dma_mapping_error() returns error, so add dev_kfree_skb() to fix it.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48958/">CVE-2022-48958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48958">CVE-2022-48958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231889">SUSE bug 1231889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48959</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions()

When dsa_devlink_region_create failed in sja1105_setup_devlink_regions(),
priv-&gt;regions is not released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48960</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48960" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48960" ref_url="https://www.suse.com/security/cve/CVE-2022-48960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hisilicon: Fix potential use-after-free in hix5hd2_rx()

The skb is delivered to napi_gro_receive() which may free it, after
calling this, dereferencing skb may trigger use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48960/">CVE-2022-48960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48960">CVE-2022-48960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231979">SUSE bug 1231979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231980">SUSE bug 1231980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48961" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48961" ref_url="https://www.suse.com/security/cve/CVE-2022-48961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mdio: fix unbalanced fwnode reference count in mdio_device_release()

There is warning report about of_node refcount leak
while probing mdio device:

OF: ERROR: memory leak, expected refcount 1 instead of 2,
of_node_get()/of_node_put() unbalanced - destroy cset entry:
attach overlay node /spi/soc@0/mdio@710700c0/ethernet@4

In of_mdiobus_register_device(), we increase fwnode refcount
by fwnode_handle_get() before associating the of_node with
mdio device, but it has never been decreased in normal path.
Since that, in mdio_device_release(), it needs to call
fwnode_handle_put() in addition instead of calling kfree()
directly.

After above, just calling mdio_device_free() in the error handle
path of of_mdiobus_register_device() is enough to keep the
refcount balanced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48961/">CVE-2022-48961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48961">CVE-2022-48961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232108">SUSE bug 1232108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48962</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48962" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48962" ref_url="https://www.suse.com/security/cve/CVE-2022-48962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hisilicon: Fix potential use-after-free in hisi_femac_rx()

The skb is delivered to napi_gro_receive() which may free it, after
calling this, dereferencing skb may trigger use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48962/">CVE-2022-48962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48962">CVE-2022-48962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232286">SUSE bug 1232286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232801">SUSE bug 1232801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48966" ref_url="https://www.suse.com/security/cve/CVE-2022-48966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mvneta: Prevent out of bounds read in mvneta_config_rss()

The pp-&gt;indir[0] value comes from the user.  It is passed to:

	if (cpu_online(pp-&gt;rxq_def))

inside the mvneta_percpu_elect() function.  It needs bounds checkeding
to ensure that it is not beyond the end of the cpu bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48966/">CVE-2022-48966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48966">CVE-2022-48966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232191">SUSE bug 1232191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48967" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48967" ref_url="https://www.suse.com/security/cve/CVE-2022-48967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: nci: Bounds check struct nfc_target arrays

While running under CONFIG_FORTIFY_SOURCE=y, syzkaller reported:

  memcpy: detected field-spanning write (size 129) of single field "target-&gt;sensf_res" at net/nfc/nci/ntf.c:260 (size 18)

This appears to be a legitimate lack of bounds checking in
nci_add_new_protocol(). Add the missing checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48967/">CVE-2022-48967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48967">CVE-2022-48967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232304">SUSE bug 1232304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232306">SUSE bug 1232306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48968</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48968" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential memory leak in otx2_init_tc()

In otx2_init_tc(), if rhashtable_init() failed, it does not free
tc-&gt;tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_bitmap().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48969" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Fix NULL sring after live migration

A NAPI is setup for each network sring to poll data to kernel
The sring with source host is destroyed before live migration and
new sring with target host is setup after live migration.
The NAPI for the old sring is not deleted until setup new sring
with target host after migration. With busy_poll/busy_read enabled,
the NAPI can be polled before got deleted when resume VM.

BUG: unable to handle kernel NULL pointer dereference at
0000000000000008
IP: xennet_poll+0xae/0xd20
PGD 0 P4D 0
Oops: 0000 [#1] SMP PTI
Call Trace:
 finish_task_switch+0x71/0x230
 timerqueue_del+0x1d/0x40
 hrtimer_try_to_cancel+0xb5/0x110
 xennet_alloc_rx_buffers+0x2a0/0x2a0
 napi_busy_loop+0xdb/0x270
 sock_poll+0x87/0x90
 do_sys_poll+0x26f/0x580
 tracing_map_insert+0x1d4/0x2f0
 event_hist_trigger+0x14a/0x260

 finish_task_switch+0x71/0x230
 __schedule+0x256/0x890
 recalc_sigpending+0x1b/0x50
 xen_sched_clock+0x15/0x20
 __rb_reserve_next+0x12d/0x140
 ring_buffer_lock_reserve+0x123/0x3d0
 event_triggers_call+0x87/0xb0
 trace_event_buffer_commit+0x1c4/0x210
 xen_clocksource_get_cycles+0x15/0x20
 ktime_get_ts64+0x51/0xf0
 SyS_ppoll+0x160/0x1a0
 SyS_ppoll+0x160/0x1a0
 do_syscall_64+0x73/0x130
 entry_SYSCALL_64_after_hwframe+0x41/0xa6
...
RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900
CR2: 0000000000000008
---[ end trace f8601785b354351c ]---

xen frontend should remove the NAPIs for the old srings before live
migration as the bond srings are destroyed

There is a tiny window between the srings are set to NULL and
the NAPIs are disabled, It is safe as the NAPI threads are still
frozen at that time
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48970</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48970" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Get user_ns from in_skb in unix_diag_get_exact().

Wei Chen reported a NULL deref in sk_user_ns() [0][1], and Paolo diagnosed
the root cause: in unix_diag_get_exact(), the newly allocated skb does not
have sk. [2]

We must get the user_ns from the NETLINK_CB(in_skb).sk and pass it to
sk_diag_fill().

[0]:
BUG: kernel NULL pointer dereference, address: 0000000000000270
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 12bbce067 P4D 12bbce067 PUD 12bc40067 PMD 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 0 PID: 27942 Comm: syz-executor.0 Not tainted 6.1.0-rc5-next-20221118 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014
RIP: 0010:sk_user_ns include/net/sock.h:920 [inline]
RIP: 0010:sk_diag_dump_uid net/unix/diag.c:119 [inline]
RIP: 0010:sk_diag_fill+0x77d/0x890 net/unix/diag.c:170
Code: 89 ef e8 66 d4 2d fd c7 44 24 40 00 00 00 00 49 8d 7c 24 18 e8
54 d7 2d fd 49 8b 5c 24 18 48 8d bb 70 02 00 00 e8 43 d7 2d fd &lt;48&gt; 8b
9b 70 02 00 00 48 8d 7b 10 e8 33 d7 2d fd 48 8b 5b 10 48 8d
RSP: 0018:ffffc90000d67968 EFLAGS: 00010246
RAX: ffff88812badaa48 RBX: 0000000000000000 RCX: ffffffff840d481d
RDX: 0000000000000465 RSI: 0000000000000000 RDI: 0000000000000270
RBP: ffffc90000d679a8 R08: 0000000000000277 R09: 0000000000000000
R10: 0001ffffffffffff R11: 0001c90000d679a8 R12: ffff88812ac03800
R13: ffff88812c87c400 R14: ffff88812ae42210 R15: ffff888103026940
FS:  00007f08b4e6f700(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000270 CR3: 000000012c58b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 unix_diag_get_exact net/unix/diag.c:285 [inline]
 unix_diag_handler_dump+0x3f9/0x500 net/unix/diag.c:317
 __sock_diag_cmd net/core/sock_diag.c:235 [inline]
 sock_diag_rcv_msg+0x237/0x250 net/core/sock_diag.c:266
 netlink_rcv_skb+0x13e/0x250 net/netlink/af_netlink.c:2564
 sock_diag_rcv+0x24/0x40 net/core/sock_diag.c:277
 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
 netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1356
 netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1932
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0x38f/0x500 net/socket.c:2476
 ___sys_sendmsg net/socket.c:2530 [inline]
 __sys_sendmsg+0x197/0x230 net/socket.c:2559
 __do_sys_sendmsg net/socket.c:2568 [inline]
 __se_sys_sendmsg net/socket.c:2566 [inline]
 __x64_sys_sendmsg+0x42/0x50 net/socket.c:2566
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x4697f9
Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d
01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f08b4e6ec48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000077bf80 RCX: 00000000004697f9
RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003
RBP: 00000000004d29e9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000077bf80
R13: 0000000000000000 R14: 000000000077bf80 R15: 00007ffdb36bc6c0
 &lt;/TASK&gt;
Modules linked in:
CR2: 0000000000000270

[1]: https://lore.kernel.org/netdev/CAO4mrfdvyjFpokhNsiwZiP-wpdSD0AStcJwfKcKQdAALQ9_2Qw@mail.gmail.com/
[2]: https://lore.kernel.org/netdev/e04315e7c90d9a75613f3993c2baf2d344eef7eb.camel@redhat.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48971</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48971" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48971" ref_url="https://www.suse.com/security/cve/CVE-2022-48971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix not cleanup led when bt_init fails

bt_init() calls bt_leds_init() to register led, but if it fails later,
bt_leds_cleanup() is not called to unregister it.

This can cause panic if the argument "bluetooth-power" in text is freed
and then another led_trigger_register() tries to access it:

BUG: unable to handle page fault for address: ffffffffc06d3bc0
RIP: 0010:strcmp+0xc/0x30
  Call Trace:
    &lt;TASK&gt;
    led_trigger_register+0x10d/0x4f0
    led_trigger_register_simple+0x7d/0x100
    bt_init+0x39/0xf7 [bluetooth]
    do_one_initcall+0xd0/0x4e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48971/">CVE-2022-48971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48971">CVE-2022-48971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232037">SUSE bug 1232037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48972</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48972" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48972" ref_url="https://www.suse.com/security/cve/CVE-2022-48972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()

Kernel fault injection test reports null-ptr-deref as follows:

BUG: kernel NULL pointer dereference, address: 0000000000000008
RIP: 0010:cfg802154_netdev_notifier_call+0x120/0x310 include/linux/list.h:114
Call Trace:
 &lt;TASK&gt;
 raw_notifier_call_chain+0x6d/0xa0 kernel/notifier.c:87
 call_netdevice_notifiers_info+0x6e/0xc0 net/core/dev.c:1944
 unregister_netdevice_many_notify+0x60d/0xcb0 net/core/dev.c:1982
 unregister_netdevice_queue+0x154/0x1a0 net/core/dev.c:10879
 register_netdevice+0x9a8/0xb90 net/core/dev.c:10083
 ieee802154_if_add+0x6ed/0x7e0 net/mac802154/iface.c:659
 ieee802154_register_hw+0x29c/0x330 net/mac802154/main.c:229
 mcr20a_probe+0xaaa/0xcb1 drivers/net/ieee802154/mcr20a.c:1316

ieee802154_if_add() allocates wpan_dev as netdev's private data, but not
init the list in struct wpan_dev. cfg802154_netdev_notifier_call() manage
the list when device register/unregister, and may lead to null-ptr-deref.

Use INIT_LIST_HEAD() on it to initialize it correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48972/">CVE-2022-48972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48972">CVE-2022-48972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232025">SUSE bug 1232025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48973</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48973" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48973" ref_url="https://www.suse.com/security/cve/CVE-2022-48973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: amd8111: Fix PCI device reference count leak

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() after the 'out' label. Since pci_dev_put() can handle NULL
input parameter, there is no problem for the 'Device not found' branch.
For the normal path, add pci_dev_put() in amd_gpio_exit().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48973/">CVE-2022-48973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48973">CVE-2022-48973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232039">SUSE bug 1232039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48975</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48975" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix memory leak in gpiochip_setup_dev()

Here is a backtrace report about memory leak detected in
gpiochip_setup_dev():

unreferenced object 0xffff88810b406400 (size 512):
  comm "python3", pid 1682, jiffies 4295346908 (age 24.090s)
  backtrace:
    kmalloc_trace
    device_add		device_private_init at drivers/base/core.c:3361
			(inlined by) device_add at drivers/base/core.c:3411
    cdev_device_add
    gpiolib_cdev_register
    gpiochip_setup_dev
    gpiochip_add_data_with_key

gcdev_register() &amp; gcdev_unregister() would call device_add() &amp;
device_del() (no matter CONFIG_GPIO_CDEV is enabled or not) to
register/unregister device.

However, if device_add() succeeds, some resource (like
struct device_private allocated by device_private_init())
is not released by device_del().

Therefore, after device_add() succeeds by gcdev_register(), it
needs to call put_device() to release resource in the error handle
path.

Here we move forward the register of release function, and let it
release every piece of resource by put_device() instead of kfree().

While at it, fix another subtle issue, i.e. when gc-&gt;ngpio is equal
to 0, we still call kcalloc() and, in case of further error, kfree()
on the ZERO_PTR pointer, which is not NULL. It's not a bug per se,
but rather waste of the resources and potentially wrong expectation
about contents of the gdev-&gt;descs variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48977</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48977" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: af_can: fix NULL pointer dereference in can_rcv_filter

Analogue to commit 8aa59e355949 ("can: af_can: fix NULL pointer
dereference in can_rx_register()") we need to check for a missing
initialization of ml_priv in the receive path of CAN frames.

Since commit 4e096a18867a ("net: introduce CAN specific pointer in the
struct net_device") the check for dev-&gt;type to be ARPHRD_CAN is not
sufficient anymore since bonding or tun netdevices claim to be CAN
devices but do not initialize ml_priv accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48978</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48978" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: fix shift-out-of-bounds in hid_report_raw_event

Syzbot reported shift-out-of-bounds in hid_report_raw_event.

microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) &gt;
32! (swapper/0)
======================================================================
UBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20
shift exponent 127 is too large for 32-bit type 'int'
CPU: 0 PID: 0 Comm: swapper/0 Not tainted
6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS
Google 10/26/2022
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:151 [inline]
 __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322
 snto32 drivers/hid/hid-core.c:1323 [inline]
 hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]
 hid_process_report drivers/hid/hid-core.c:1665 [inline]
 hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998
 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066
 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284
 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671
 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988
 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474
 expire_timers kernel/time/timer.c:1519 [inline]
 __run_timers+0x76a/0x980 kernel/time/timer.c:1790
 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803
 __do_softirq+0x277/0x75b kernel/softirq.c:571
 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107
======================================================================

If the size of the integer (unsigned n) is bigger than 32 in snto32(),
shift exponent will be too large for 32-bit type 'int', resulting in a
shift-out-of-bounds bug.
Fix this by adding a check on the size of the integer (unsigned n) in
snto32(). To add support for n greater than 32 bits, set n to 32, if n
is greater than 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48979</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48979" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48979" ref_url="https://www.suse.com/security/cve/CVE-2022-48979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix array index out of bound error in DCN32 DML

[Why&amp;How]
LinkCapacitySupport array is indexed with the number of voltage states and
not the number of max DPPs. Fix the error by changing the array
declaration to use the correct (larger) array size of total number of
voltage states.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48979/">CVE-2022-48979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48979">CVE-2022-48979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232293">SUSE bug 1232293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48980</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48980" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48980" ref_url="https://www.suse.com/security/cve/CVE-2022-48980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing()

The SJA1105 family has 45 L2 policing table entries
(SJA1105_MAX_L2_POLICING_COUNT) and SJA1110 has 110
(SJA1110_MAX_L2_POLICING_COUNT). Keeping the table structure but
accounting for the difference in port count (5 in SJA1105 vs 10 in
SJA1110) does not fully explain the difference. Rather, the SJA1110 also
has L2 ingress policers for multicast traffic. If a packet is classified
as multicast, it will be processed by the policer index 99 + SRCPORT.

The sja1105_init_l2_policing() function initializes all L2 policers such
that they don't interfere with normal packet reception by default. To have
a common code between SJA1105 and SJA1110, the index of the multicast
policer for the port is calculated because it's an index that is out of
bounds for SJA1105 but in bounds for SJA1110, and a bounds check is
performed.

The code fails to do the proper thing when determining what to do with the
multicast policer of port 0 on SJA1105 (ds-&gt;num_ports = 5). The "mcast"
index will be equal to 45, which is also equal to
table-&gt;ops-&gt;max_entry_count (SJA1105_MAX_L2_POLICING_COUNT). So it passes
through the check. But at the same time, SJA1105 doesn't have multicast
policers. So the code programs the SHARINDX field of an out-of-bounds
element in the L2 Policing table of the static config.

The comparison between index 45 and 45 entries should have determined the
code to not access this policer index on SJA1105, since its memory wasn't
even allocated.

With enough bad luck, the out-of-bounds write could even overwrite other
valid kernel data, but in this case, the issue was detected using KASAN.

Kernel log:

sja1105 spi5.0: Probed switch chip: SJA1105Q
==================================================================
BUG: KASAN: slab-out-of-bounds in sja1105_setup+0x1cbc/0x2340
Write of size 8 at addr ffffff880bd57708 by task kworker/u8:0/8
...
Workqueue: events_unbound deferred_probe_work_func
Call trace:
...
sja1105_setup+0x1cbc/0x2340
dsa_register_switch+0x1284/0x18d0
sja1105_probe+0x748/0x840
...
Allocated by task 8:
...
sja1105_setup+0x1bcc/0x2340
dsa_register_switch+0x1284/0x18d0
sja1105_probe+0x748/0x840
...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48980/">CVE-2022-48980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48980">CVE-2022-48980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232233">SUSE bug 1232233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48981" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/shmem-helper: Remove errant put in error path

drm_gem_shmem_mmap() doesn't own this reference, resulting in the GEM
object getting prematurely freed leading to a later use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48982" ref_url="https://www.suse.com/security/cve/CVE-2022-48982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix crash when replugging CSR fake controllers

It seems fake CSR 5.0 clones can cause the suspend notifier to be
registered twice causing the following kernel panic:

[   71.986122] Call Trace:
[   71.986124]  &lt;TASK&gt;
[   71.986125]  blocking_notifier_chain_register+0x33/0x60
[   71.986130]  hci_register_dev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da]
[   71.986154]  btusb_probe+0x979/0xd85 [btusb e1e0605a4f4c01984a4b9c8ac58c3666ae287477]
[   71.986159]  ? __pm_runtime_set_status+0x1a9/0x300
[   71.986162]  ? ktime_get_mono_fast_ns+0x3e/0x90
[   71.986167]  usb_probe_interface+0xe3/0x2b0
[   71.986171]  really_probe+0xdb/0x380
[   71.986174]  ? pm_runtime_barrier+0x54/0x90
[   71.986177]  __driver_probe_device+0x78/0x170
[   71.986180]  driver_probe_device+0x1f/0x90
[   71.986183]  __device_attach_driver+0x89/0x110
[   71.986186]  ? driver_allows_async_probing+0x70/0x70
[   71.986189]  bus_for_each_drv+0x8c/0xe0
[   71.986192]  __device_attach+0xb2/0x1e0
[   71.986195]  bus_probe_device+0x92/0xb0
[   71.986198]  device_add+0x422/0x9a0
[   71.986201]  ? sysfs_merge_group+0xd4/0x110
[   71.986205]  usb_set_configuration+0x57a/0x820
[   71.986208]  usb_generic_driver_probe+0x4f/0x70
[   71.986211]  usb_probe_device+0x3a/0x110
[   71.986213]  really_probe+0xdb/0x380
[   71.986216]  ? pm_runtime_barrier+0x54/0x90
[   71.986219]  __driver_probe_device+0x78/0x170
[   71.986221]  driver_probe_device+0x1f/0x90
[   71.986224]  __device_attach_driver+0x89/0x110
[   71.986227]  ? driver_allows_async_probing+0x70/0x70
[   71.986230]  bus_for_each_drv+0x8c/0xe0
[   71.986232]  __device_attach+0xb2/0x1e0
[   71.986235]  bus_probe_device+0x92/0xb0
[   71.986237]  device_add+0x422/0x9a0
[   71.986239]  ? _dev_info+0x7d/0x98
[   71.986242]  ? blake2s_update+0x4c/0xc0
[   71.986246]  usb_new_device.cold+0x148/0x36d
[   71.986250]  hub_event+0xa8a/0x1910
[   71.986255]  process_one_work+0x1c4/0x380
[   71.986259]  worker_thread+0x51/0x390
[   71.986262]  ? rescuer_thread+0x3b0/0x3b0
[   71.986264]  kthread+0xdb/0x110
[   71.986266]  ? kthread_complete_and_exit+0x20/0x20
[   71.986268]  ret_from_fork+0x1f/0x30
[   71.986273]  &lt;/TASK&gt;
[   71.986274] ---[ end trace 0000000000000000 ]---
[   71.986284] btusb: probe of 2-1.6:1.0 failed with error -17
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48982/">CVE-2022-48982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48982">CVE-2022-48982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231978">SUSE bug 1231978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48983</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48983" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48983" ref_url="https://www.suse.com/security/cve/CVE-2022-48983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()

Syzkaller reports a NULL deref bug as follows:

 BUG: KASAN: null-ptr-deref in io_tctx_exit_cb+0x53/0xd3
 Read of size 4 at addr 0000000000000138 by task file1/1955

 CPU: 1 PID: 1955 Comm: file1 Not tainted 6.1.0-rc7-00103-gef4d3ea40565 #75
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0xcd/0x134
  ? io_tctx_exit_cb+0x53/0xd3
  kasan_report+0xbb/0x1f0
  ? io_tctx_exit_cb+0x53/0xd3
  kasan_check_range+0x140/0x190
  io_tctx_exit_cb+0x53/0xd3
  task_work_run+0x164/0x250
  ? task_work_cancel+0x30/0x30
  get_signal+0x1c3/0x2440
  ? lock_downgrade+0x6e0/0x6e0
  ? lock_downgrade+0x6e0/0x6e0
  ? exit_signals+0x8b0/0x8b0
  ? do_raw_read_unlock+0x3b/0x70
  ? do_raw_spin_unlock+0x50/0x230
  arch_do_signal_or_restart+0x82/0x2470
  ? kmem_cache_free+0x260/0x4b0
  ? putname+0xfe/0x140
  ? get_sigframe_size+0x10/0x10
  ? do_execveat_common.isra.0+0x226/0x710
  ? lockdep_hardirqs_on+0x79/0x100
  ? putname+0xfe/0x140
  ? do_execveat_common.isra.0+0x238/0x710
  exit_to_user_mode_prepare+0x15f/0x250
  syscall_exit_to_user_mode+0x19/0x50
  do_syscall_64+0x42/0xb0
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 RIP: 0023:0x0
 Code: Unable to access opcode bytes at 0xffffffffffffffd6.
 RSP: 002b:00000000fffb7790 EFLAGS: 00000200 ORIG_RAX: 000000000000000b
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Kernel panic - not syncing: panic_on_warn set ...

This happens because the adding of task_work from io_ring_exit_work()
isn't synchronized with canceling all work items from eg exec. The
execution of the two are ordered in that they are both run by the task
itself, but if io_tctx_exit_cb() is queued while we're canceling all
work items off exec AND gets executed when the task exits to userspace
rather than in the main loop in io_uring_cancel_generic(), then we can
find current-&gt;io_uring == NULL and hit the above crash.

It's safe to add this NULL check here, because the execution of the two
paths are done by the task itself.

[axboe: add code comment and also put an explanation in the commit msg]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48983/">CVE-2022-48983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48983">CVE-2022-48983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231959">SUSE bug 1231959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48985</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48985" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48985" ref_url="https://www.suse.com/security/cve/CVE-2022-48985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix race on per-CQ variable napi work_done

After calling napi_complete_done(), the NAPIF_STATE_SCHED bit may be
cleared, and another CPU can start napi thread and access per-CQ variable,
cq-&gt;work_done. If the other thread (for example, from busy_poll) sets
it to a value &gt;= budget, this thread will continue to run when it should
stop, and cause memory corruption and panic.

To fix this issue, save the per-CQ work_done variable in a local variable
before napi_complete_done(), so it won't be corrupted by a possible
concurrent thread after napi_complete_done().

Also, add a flag bit to advertise to the NIC firmware: the NAPI work_done
variable race is fixed, so the driver is able to reliably support features
like busy_poll.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48985/">CVE-2022-48985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48985">CVE-2022-48985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231958">SUSE bug 1231958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48987</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48987" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-dv-timings.c: fix too strict blanking sanity checks

Sanity checks were added to verify the v4l2_bt_timings blanking fields
in order to avoid integer overflows when userspace passes weird values.

But that assumed that userspace would correctly fill in the front porch,
backporch and sync values, but sometimes all you know is the total
blanking, which is then assigned to just one of these fields.

And that can fail with these checks.

So instead set a maximum for the total horizontal and vertical
blanking and check that each field remains below that.

That is still sufficient to avoid integer overflows, but it also
allows for more flexibility in how userspace fills in these fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48988</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcg: fix possible use-after-free in memcg_write_event_control()

memcg_write_event_control() accesses the dentry-&gt;d_name of the specified
control fd to route the write call.  As a cgroup interface file can't be
renamed, it's safe to access d_name as long as the specified file is a
regular cgroup file.  Also, as these cgroup interface files can't be
removed before the directory, it's safe to access the parent too.

Prior to 347c4a874710 ("memcg: remove cgroup_event-&gt;cft"), there was a
call to __file_cft() which verified that the specified file is a regular
cgroupfs file before further accesses.  The cftype pointer returned from
__file_cft() was no longer necessary and the commit inadvertently dropped
the file type check with it allowing any file to slip through.  With the
invarients broken, the d_name and parent accesses can now race against
renames and removals of arbitrary files and cause use-after-free's.

Fix the bug by resurrecting the file type check in __file_cft().  Now that
cgroupfs is implemented through kernfs, checking the file operations needs
to go through a layer of indirection.  Instead, let's check the superblock
and dentry type.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232106">SUSE bug 1232106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48989" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: Fix oops due to race with cookie_lru and use_cookie

If a cookie expires from the LRU and the LRU_DISCARD flag is set, but
the state machine has not run yet, it's possible another thread can call
fscache_use_cookie and begin to use it.

When the cookie_worker finally runs, it will see the LRU_DISCARD flag
set, transition the cookie-&gt;state to LRU_DISCARDING, which will then
withdraw the cookie.  Once the cookie is withdrawn the object is removed
the below oops will occur because the object associated with the cookie
is now NULL.

Fix the oops by clearing the LRU_DISCARD bit if another thread uses the
cookie before the cookie_worker runs.

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  ...
  CPU: 31 PID: 44773 Comm: kworker/u130:1 Tainted: G     E    6.0.0-5.dneg.x86_64 #1
  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
  Workqueue: events_unbound netfs_rreq_write_to_cache_work [netfs]
  RIP: 0010:cachefiles_prepare_write+0x28/0x90 [cachefiles]
  ...
  Call Trace:
    netfs_rreq_write_to_cache_work+0x11c/0x320 [netfs]
    process_one_work+0x217/0x3e0
    worker_thread+0x4a/0x3b0
    kthread+0xd6/0x100
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232027">SUSE bug 1232027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48990</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48990" ref_url="https://www.suse.com/security/cve/CVE-2022-48990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free during gpu recovery

[Why]
    [  754.862560] refcount_t: underflow; use-after-free.
    [  754.862898] Call Trace:
    [  754.862903]  &lt;TASK&gt;
    [  754.862913]  amdgpu_job_free_cb+0xc2/0xe1 [amdgpu]
    [  754.863543]  drm_sched_main.cold+0x34/0x39 [amd_sched]

[How]
    The fw_fence may be not init, check whether dma_fence_init
    is performed before job free
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48990/">CVE-2022-48990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48990">CVE-2022-48990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232028">SUSE bug 1232028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232029">SUSE bug 1232029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48991</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48991" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths

Any codepath that zaps page table entries must invoke MMU notifiers to
ensure that secondary MMUs (like KVM) don't keep accessing pages which
aren't mapped anymore.  Secondary MMUs don't hold their own references to
pages that are mirrored over, so failing to notify them can lead to page
use-after-free.

I'm marking this as addressing an issue introduced in commit f3f0e1d2150b
("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of
the security impact of this only came in commit 27e1f8273113 ("khugepaged:
enable collapse pmd for pte-mapped THP"), which actually omitted flushes
for the removal of present PTEs, not just for the removal of empty page
tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232372">SUSE bug 1232372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48992</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48992" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: Add NULL check in BE reparenting

Add NULL check in dpcm_be_reparent API, to handle
kernel NULL pointer dereference error.
The issue occurred in fuzzing test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48994</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48994" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed.

seq_copy_in_user() and seq_copy_in_kernel() did not have prototypes
matching snd_seq_dump_func_t. Adjust this and remove the casts. There
are not resulting binary output differences.

This was found as a result of Clang's new -Wcast-function-type-strict
flag, which is more sensitive than the simpler -Wcast-function-type,
which only checks for type width mismatches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48995" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send()

There is a kmemleak when test the raydium_i2c_ts with bpf mock device:

  unreferenced object 0xffff88812d3675a0 (size 8):
    comm "python3", pid 349, jiffies 4294741067 (age 95.695s)
    hex dump (first 8 bytes):
      11 0e 10 c0 01 00 04 00                          ........
    backtrace:
      [&lt;0000000068427125&gt;] __kmalloc+0x46/0x1b0
      [&lt;0000000090180f91&gt;] raydium_i2c_send+0xd4/0x2bf [raydium_i2c_ts]
      [&lt;000000006e631aee&gt;] raydium_i2c_initialize.cold+0xbc/0x3e4 [raydium_i2c_ts]
      [&lt;00000000dc6fcf38&gt;] raydium_i2c_probe+0x3cd/0x6bc [raydium_i2c_ts]
      [&lt;00000000a310de16&gt;] i2c_device_probe+0x651/0x680
      [&lt;00000000f5a96bf3&gt;] really_probe+0x17c/0x3f0
      [&lt;00000000096ba499&gt;] __driver_probe_device+0xe3/0x170
      [&lt;00000000c5acb4d9&gt;] driver_probe_device+0x49/0x120
      [&lt;00000000264fe082&gt;] __device_attach_driver+0xf7/0x150
      [&lt;00000000f919423c&gt;] bus_for_each_drv+0x114/0x180
      [&lt;00000000e067feca&gt;] __device_attach+0x1e5/0x2d0
      [&lt;0000000054301fc2&gt;] bus_probe_device+0x126/0x140
      [&lt;00000000aad93b22&gt;] device_add+0x810/0x1130
      [&lt;00000000c086a53f&gt;] i2c_new_client_device+0x352/0x4e0
      [&lt;000000003c2c248c&gt;] of_i2c_register_device+0xf1/0x110
      [&lt;00000000ffec4177&gt;] of_i2c_notify+0x100/0x160
  unreferenced object 0xffff88812d3675c8 (size 8):
    comm "python3", pid 349, jiffies 4294741070 (age 95.692s)
    hex dump (first 8 bytes):
      22 00 36 2d 81 88 ff ff                          ".6-....
    backtrace:
      [&lt;0000000068427125&gt;] __kmalloc+0x46/0x1b0
      [&lt;0000000090180f91&gt;] raydium_i2c_send+0xd4/0x2bf [raydium_i2c_ts]
      [&lt;000000001d5c9620&gt;] raydium_i2c_initialize.cold+0x223/0x3e4 [raydium_i2c_ts]
      [&lt;00000000dc6fcf38&gt;] raydium_i2c_probe+0x3cd/0x6bc [raydium_i2c_ts]
      [&lt;00000000a310de16&gt;] i2c_device_probe+0x651/0x680
      [&lt;00000000f5a96bf3&gt;] really_probe+0x17c/0x3f0
      [&lt;00000000096ba499&gt;] __driver_probe_device+0xe3/0x170
      [&lt;00000000c5acb4d9&gt;] driver_probe_device+0x49/0x120
      [&lt;00000000264fe082&gt;] __device_attach_driver+0xf7/0x150
      [&lt;00000000f919423c&gt;] bus_for_each_drv+0x114/0x180
      [&lt;00000000e067feca&gt;] __device_attach+0x1e5/0x2d0
      [&lt;0000000054301fc2&gt;] bus_probe_device+0x126/0x140
      [&lt;00000000aad93b22&gt;] device_add+0x810/0x1130
      [&lt;00000000c086a53f&gt;] i2c_new_client_device+0x352/0x4e0
      [&lt;000000003c2c248c&gt;] of_i2c_register_device+0xf1/0x110
      [&lt;00000000ffec4177&gt;] of_i2c_notify+0x100/0x160

After BANK_SWITCH command from i2c BUS, no matter success or error
happened, the tx_buf should be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48997</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: tpm: Protect tpm_pm_suspend with locks

Currently tpm transactions are executed unconditionally in
tpm_pm_suspend() function, which may lead to races with other tpm
accessors in the system.

Specifically, the hw_random tpm driver makes use of tpm_get_random(),
and this function is called in a loop from a kthread, which means it's
not frozen alongside userspace, and so can race with the work done
during system suspend:

  tpm tpm0: tpm_transmit: tpm_recv: error -52
  tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
  CPU: 0 PID: 1 Comm: init Not tainted 6.1.0-rc5+ #135
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
  Call Trace:
   tpm_tis_status.cold+0x19/0x20
   tpm_transmit+0x13b/0x390
   tpm_transmit_cmd+0x20/0x80
   tpm1_pm_suspend+0xa6/0x110
   tpm_pm_suspend+0x53/0x80
   __pnp_bus_suspend+0x35/0xe0
   __device_suspend+0x10f/0x350

Fix this by calling tpm_try_get_ops(), which itself is a wrapper around
tpm_chip_start(), but takes the appropriate mutex.

[Jason: reworked commit message, added metadata]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48999</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48999" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference

Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match:
    fib_nh_match+0xf98/0x1130 linux-6.0-rc7/net/ipv4/fib_semantics.c:961
    fib_table_delete+0x5f3/0xa40 linux-6.0-rc7/net/ipv4/fib_trie.c:1753
    inet_rtm_delroute+0x2b3/0x380 linux-6.0-rc7/net/ipv4/fib_frontend.c:874

Separate nexthop objects are mutually exclusive with the legacy
multipath spec. Fix fib_nh_match to return if the config for the
to be deleted route contains a multipath spec while the fib_info
is using a nexthop object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49000" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix PCI device refcount leak in has_external_pci()

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() before 'return true' to avoid reference count leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49002</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49002" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49002" ref_url="https://www.suse.com/security/cve/CVE-2022-49002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init()

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() for the error path to avoid reference count leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49002/">CVE-2022-49002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49002">CVE-2022-49002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232133">SUSE bug 1232133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49003</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49003" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix SRCU protection of nvme_ns_head list

Walking the nvme_ns_head siblings list is protected by the head's srcu
in nvme_ns_head_submit_bio() but not nvme_mpath_revalidate_paths().
Removing namespaces from the list also fails to synchronize the srcu.
Concurrent scan work can therefore cause use-after-frees.

Hold the head's srcu lock in nvme_mpath_revalidate_paths() and
synchronize with the srcu, not the global RCU, in nvme_ns_remove().

Observed the following panic when making NVMe/RDMA connections
with native multipath on the Rocky Linux 8.6 kernel
(it seems the upstream kernel has the same race condition).
Disassembly shows the faulting instruction is cmp 0x50(%rdx),%rcx;
computing capacity != get_capacity(ns-&gt;disk).
Address 0x50 is dereferenced because ns-&gt;disk is NULL.
The NULL disk appears to be the result of concurrent scan work
freeing the namespace (note the log line in the middle of the panic).

[37314.206036] BUG: unable to handle kernel NULL pointer dereference at 0000000000000050
[37314.206036] nvme0n3: detected capacity change from 0 to 11811160064
[37314.299753] PGD 0 P4D 0
[37314.299756] Oops: 0000 [#1] SMP PTI
[37314.299759] CPU: 29 PID: 322046 Comm: kworker/u98:3 Kdump: loaded Tainted: G        W      X --------- -  - 4.18.0-372.32.1.el8test86.x86_64 #1
[37314.299762] Hardware name: Dell Inc. PowerEdge R720/0JP31P, BIOS 2.7.0 05/23/2018
[37314.299763] Workqueue: nvme-wq nvme_scan_work [nvme_core]
[37314.299783] RIP: 0010:nvme_mpath_revalidate_paths+0x26/0xb0 [nvme_core]
[37314.299790] Code: 1f 44 00 00 66 66 66 66 90 55 53 48 8b 5f 50 48 8b 83 c8 c9 00 00 48 8b 13 48 8b 48 50 48 39 d3 74 20 48 8d 42 d0 48 8b 50 20 &lt;48&gt; 3b 4a 50 74 05 f0 80 60 70 ef 48 8b 50 30 48 8d 42 d0 48 39 d3
[37315.058803] RSP: 0018:ffffabe28f913d10 EFLAGS: 00010202
[37315.121316] RAX: ffff927a077da800 RBX: ffff92991dd70000 RCX: 0000000001600000
[37315.206704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff92991b719800
[37315.292106] RBP: ffff929a6b70c000 R08: 000000010234cd4a R09: c0000000ffff7fff
[37315.377501] R10: 0000000000000001 R11: ffffabe28f913a30 R12: 0000000000000000
[37315.462889] R13: ffff92992716600c R14: ffff929964e6e030 R15: ffff92991dd70000
[37315.548286] FS:  0000000000000000(0000) GS:ffff92b87fb80000(0000) knlGS:0000000000000000
[37315.645111] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[37315.713871] CR2: 0000000000000050 CR3: 0000002208810006 CR4: 00000000000606e0
[37315.799267] Call Trace:
[37315.828515]  nvme_update_ns_info+0x1ac/0x250 [nvme_core]
[37315.892075]  nvme_validate_or_alloc_ns+0x2ff/0xa00 [nvme_core]
[37315.961871]  ? __blk_mq_free_request+0x6b/0x90
[37316.015021]  nvme_scan_work+0x151/0x240 [nvme_core]
[37316.073371]  process_one_work+0x1a7/0x360
[37316.121318]  ? create_worker+0x1a0/0x1a0
[37316.168227]  worker_thread+0x30/0x390
[37316.212024]  ? create_worker+0x1a0/0x1a0
[37316.258939]  kthread+0x10a/0x120
[37316.297557]  ? set_kthread_struct+0x50/0x50
[37316.347590]  ret_from_fork+0x35/0x40
[37316.390360] Modules linked in: nvme_rdma nvme_tcp(X) nvme_fabrics nvme_core netconsole iscsi_tcp libiscsi_tcp dm_queue_length dm_service_time nf_conntrack_netlink br_netfilter bridge stp llc overlay nft_chain_nat ipt_MASQUERADE nf_nat xt_addrtype xt_CT nft_counter xt_state xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment xt_multiport nft_compat nf_tables libcrc32c nfnetlink dm_multipath tg3 rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm intel_rapl_msr iTCO_wdt iTCO_vendor_support dcdbas intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel ipmi_ssif kvm irqbypass crct10dif_pclmul crc32_pclmul mlx5_ib ghash_clmulni_intel ib_uverbs rapl intel_cstate intel_uncore ib_core ipmi_si joydev mei_me pcspkr ipmi_devintf mei lpc_ich wmi ipmi_msghandler acpi_power_meter ex
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232139">SUSE bug 1232139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49005</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49005" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Fix bounds check for _sx controls

For _sx controls the semantics of the max field is not the usual one, max
is the number of steps rather than the maximum value. This means that our
check in snd_soc_put_volsw_sx() needs to just check against the maximum
value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49006" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Free buffers when a used dynamic event is removed

After 65536 dynamic events have been added and removed, the "type" field
of the event then uses the first type number that is available (not
currently used by other events). A type number is the identifier of the
binary blobs in the tracing ring buffer (known as events) to map them to
logic that can parse the binary blob.

The issue is that if a dynamic event (like a kprobe event) is traced and
is in the ring buffer, and then that event is removed (because it is
dynamic, which means it can be created and destroyed), if another dynamic
event is created that has the same number that new event's logic on
parsing the binary blob will be used.

To show how this can be an issue, the following can crash the kernel:

 # cd /sys/kernel/tracing
 # for i in `seq 65536`; do
     echo 'p:kprobes/foo do_sys_openat2 $arg1:u32' &gt; kprobe_events
 # done

For every iteration of the above, the writing to the kprobe_events will
remove the old event and create a new one (with the same format) and
increase the type number to the next available on until the type number
reaches over 65535 which is the max number for the 16 bit type. After it
reaches that number, the logic to allocate a new number simply looks for
the next available number. When an dynamic event is removed, that number
is then available to be reused by the next dynamic event created. That is,
once the above reaches the max number, the number assigned to the event in
that loop will remain the same.

Now that means deleting one dynamic event and created another will reuse
the previous events type number. This is where bad things can happen.
After the above loop finishes, the kprobes/foo event which reads the
do_sys_openat2 function call's first parameter as an integer.

 # echo 1 &gt; kprobes/foo/enable
 # cat /etc/passwd &gt; /dev/null
 # cat trace
             cat-2211    [005] ....  2007.849603: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
             cat-2211    [005] ....  2007.849620: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
             cat-2211    [005] ....  2007.849838: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
             cat-2211    [005] ....  2007.849880: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
 # echo 0 &gt; kprobes/foo/enable

Now if we delete the kprobe and create a new one that reads a string:

 # echo 'p:kprobes/foo do_sys_openat2 +0($arg2):string' &gt; kprobe_events

And now we can the trace:

 # cat trace
        sendmail-1942    [002] .....   530.136320: foo: (do_sys_openat2+0x0/0x240) arg1=             cat-2046    [004] .....   530.930817: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
             cat-2046    [004] .....   530.930961: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
             cat-2046    [004] .....   530.934278: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
             cat-2046    [004] .....   530.934563: foo: (do_sys_openat2+0x0/0x240) arg1="���������������������������������������
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49007" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()

Syzbot reported a null-ptr-deref bug:

 NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP
 frequency &lt; 30 seconds
 general protection fault, probably for non-canonical address
 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN
 KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
 CPU: 1 PID: 3603 Comm: segctord Not tainted
 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0
 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google
 10/11/2022
 RIP: 0010:nilfs_palloc_commit_free_entry+0xe5/0x6b0
 fs/nilfs2/alloc.c:608
 Code: 00 00 00 00 fc ff df 80 3c 02 00 0f 85 cd 05 00 00 48 b8 00 00 00
 00 00 fc ff df 4c 8b 73 08 49 8d 7e 10 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02
 00 0f 85 26 05 00 00 49 8b 46 10 be a6 00 00 00 48 c7 c7
 RSP: 0018:ffffc90003dff830 EFLAGS: 00010212
 RAX: dffffc0000000000 RBX: ffff88802594e218 RCX: 000000000000000d
 RDX: 0000000000000002 RSI: 0000000000002000 RDI: 0000000000000010
 RBP: ffff888071880222 R08: 0000000000000005 R09: 000000000000003f
 R10: 000000000000000d R11: 0000000000000000 R12: ffff888071880158
 R13: ffff88802594e220 R14: 0000000000000000 R15: 0000000000000004
 FS:  0000000000000000(0000) GS:ffff8880b9b00000(0000)
 knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fb1c08316a8 CR3: 0000000018560000 CR4: 0000000000350ee0
 Call Trace:
  &lt;TASK&gt;
  nilfs_dat_commit_free fs/nilfs2/dat.c:114 [inline]
  nilfs_dat_commit_end+0x464/0x5f0 fs/nilfs2/dat.c:193
  nilfs_dat_commit_update+0x26/0x40 fs/nilfs2/dat.c:236
  nilfs_btree_commit_update_v+0x87/0x4a0 fs/nilfs2/btree.c:1940
  nilfs_btree_commit_propagate_v fs/nilfs2/btree.c:2016 [inline]
  nilfs_btree_propagate_v fs/nilfs2/btree.c:2046 [inline]
  nilfs_btree_propagate+0xa00/0xd60 fs/nilfs2/btree.c:2088
  nilfs_bmap_propagate+0x73/0x170 fs/nilfs2/bmap.c:337
  nilfs_collect_file_data+0x45/0xd0 fs/nilfs2/segment.c:568
  nilfs_segctor_apply_buffers+0x14a/0x470 fs/nilfs2/segment.c:1018
  nilfs_segctor_scan_file+0x3f4/0x6f0 fs/nilfs2/segment.c:1067
  nilfs_segctor_collect_blocks fs/nilfs2/segment.c:1197 [inline]
  nilfs_segctor_collect fs/nilfs2/segment.c:1503 [inline]
  nilfs_segctor_do_construct+0x12fc/0x6af0 fs/nilfs2/segment.c:2045
  nilfs_segctor_construct+0x8e3/0xb30 fs/nilfs2/segment.c:2379
  nilfs_segctor_thread_construct fs/nilfs2/segment.c:2487 [inline]
  nilfs_segctor_thread+0x3c3/0xf30 fs/nilfs2/segment.c:2570
  kthread+0x2e4/0x3a0 kernel/kthread.c:376
  ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
  &lt;/TASK&gt;
 ...

If DAT metadata file is corrupted on disk, there is a case where
req-&gt;pr_desc_bh is NULL and blocknr is 0 at nilfs_dat_commit_end() during
a b-tree operation that cascadingly updates ancestor nodes of the b-tree,
because nilfs_dat_commit_alloc() for a lower level block can initialize
the blocknr on the same DAT entry between nilfs_dat_prepare_end() and
nilfs_dat_commit_end().

If this happens, nilfs_dat_commit_end() calls nilfs_dat_commit_free()
without valid buffer heads in req-&gt;pr_desc_bh and req-&gt;pr_bitmap_bh, and
causes the NULL pointer dereference above in
nilfs_palloc_commit_free_entry() function, which leads to a crash.

Fix this by adding a NULL check on req-&gt;pr_desc_bh and req-&gt;pr_bitmap_bh
before nilfs_palloc_commit_free_entry() in nilfs_dat_commit_free().

This also calls nilfs_error() in that case to notify that there is a fatal
flaw in the filesystem metadata and prevent further operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49010</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49010" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Check for null before removing sysfs attrs

If coretemp_add_core() gets an error then pdata-&gt;core_data[indx]
is already NULL and has been kfreed. Don't pass that to
sysfs_remove_group() as that will crash in sysfs_remove_group().

[Shortened for readability]
[91854.020159] sysfs: cannot create duplicate filename '/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label'
&lt;cpu offline&gt;
[91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188
[91855.165103] #PF: supervisor read access in kernel mode
[91855.194506] #PF: error_code(0x0000) - not-present page
[91855.224445] PGD 0 P4D 0
[91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI
...
[91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80
...
[91855.796571] Call Trace:
[91855.810524]  coretemp_cpu_offline+0x12b/0x1dd [coretemp]
[91855.841738]  ? coretemp_cpu_online+0x180/0x180 [coretemp]
[91855.871107]  cpuhp_invoke_callback+0x105/0x4b0
[91855.893432]  cpuhp_thread_fun+0x8e/0x150
...

Fix this by checking for NULL first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49011</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49011" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()

As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put(). So call it after using to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49012</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49012" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix server-&gt;active leak in afs_put_server

The atomic_read was accidentally replaced with atomic_inc_return,
which prevents the server from getting cleaned up and causes rmmod
to hang with a warning:

    Can't purge s=00000001
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49014</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49014" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tun: Fix use-after-free in tun_detach()

syzbot reported use-after-free in tun_detach() [1].  This causes call
trace like below:

==================================================================
BUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
Read of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673

CPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x15e/0x461 mm/kasan/report.c:395
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
 notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
 call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942
 call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]
 call_netdevice_notifiers net/core/dev.c:1997 [inline]
 netdev_wait_allrefs_any net/core/dev.c:10237 [inline]
 netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351
 tun_detach drivers/net/tun.c:704 [inline]
 tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467
 __fput+0x27c/0xa90 fs/file_table.c:320
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xb3d/0x2a30 kernel/exit.c:820
 do_group_exit+0xd4/0x2a0 kernel/exit.c:950
 get_signal+0x21b1/0x2440 kernel/signal.c:2858
 arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296
 do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The cause of the issue is that sock_put() from __tun_detach() drops
last reference count for struct net, and then notifier_call_chain()
from netdev_state_change() accesses that struct net.

This patch fixes the issue by calling sock_put() from tun_detach()
after all necessary accesses for the struct net has done.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232818">SUSE bug 1232818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49015</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49015" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49015" ref_url="https://www.suse.com/security/cve/CVE-2022-49015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hsr: Fix potential use-after-free

The skb is delivered to netif_rx() which may free it, after calling this,
dereferencing skb may trigger use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49015/">CVE-2022-49015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49015">CVE-2022-49015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231938">SUSE bug 1231938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233021">SUSE bug 1233021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mdiobus: fix unbalanced node reference count

I got the following report while doing device(mscc-miim) load test
with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled:

  OF: ERROR: memory leak, expected refcount 1 instead of 2,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /spi/soc@0/mdio@7107009c/ethernet-phy@0

If the 'fwnode' is not an acpi node, the refcount is get in
fwnode_mdiobus_phy_device_register(), but it has never been
put when the device is freed in the normal path. So call
fwnode_handle_put() in phy_device_release() to avoid leak.

If it's an acpi node, it has never been get, but it's put
in the error path, so call fwnode_handle_get() before
phy_device_register() to keep get/put operation balanced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49017</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49017" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49017" ref_url="https://www.suse.com/security/cve/CVE-2022-49017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: re-fetch skb cb after tipc_msg_validate

As the call trace shows, the original skb was freed in tipc_msg_validate(),
and dereferencing the old skb cb would cause an use-after-free crash.

  BUG: KASAN: use-after-free in tipc_crypto_rcv_complete+0x1835/0x2240 [tipc]
  Call Trace:
   &lt;IRQ&gt;
   tipc_crypto_rcv_complete+0x1835/0x2240 [tipc]
   tipc_crypto_rcv+0xd32/0x1ec0 [tipc]
   tipc_rcv+0x744/0x1150 [tipc]
  ...
  Allocated by task 47078:
   kmem_cache_alloc_node+0x158/0x4d0
   __alloc_skb+0x1c1/0x270
   tipc_buf_acquire+0x1e/0xe0 [tipc]
   tipc_msg_create+0x33/0x1c0 [tipc]
   tipc_link_build_proto_msg+0x38a/0x2100 [tipc]
   tipc_link_timeout+0x8b8/0xef0 [tipc]
   tipc_node_timeout+0x2a1/0x960 [tipc]
   call_timer_fn+0x2d/0x1c0
  ...
  Freed by task 47078:
   tipc_msg_validate+0x7b/0x440 [tipc]
   tipc_crypto_rcv_complete+0x4b5/0x2240 [tipc]
   tipc_crypto_rcv+0xd32/0x1ec0 [tipc]
   tipc_rcv+0x744/0x1150 [tipc]

This patch fixes it by re-fetching the skb cb from the new allocated skb
after calling tipc_msg_validate().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49017/">CVE-2022-49017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49017">CVE-2022-49017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232004">SUSE bug 1232004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49019</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49019" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: nixge: fix NULL dereference

In function nixge_hw_dma_bd_release() dereference of NULL pointer
priv-&gt;rx_bd_v is possible for the case of its allocation failure in
nixge_hw_dma_bd_init().

Move for() loop with priv-&gt;rx_bd_v dereference under the check for
its validity.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49020</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49020" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49020" ref_url="https://www.suse.com/security/cve/CVE-2022-49020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/9p: Fix a potential socket leak in p9_socket_open

Both p9_fd_create_tcp() and p9_fd_create_unix() will call
p9_socket_open(). If the creation of p9_trans_fd fails,
p9_fd_create_tcp() and p9_fd_create_unix() will return an
error directly instead of releasing the cscoket, which will
result in a socket leak.

This patch adds sock_release() to fix the leak issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49020/">CVE-2022-49020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49020">CVE-2022-49020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232175">SUSE bug 1232175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49021</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49021" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49021" ref_url="https://www.suse.com/security/cve/CVE-2022-49021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: fix null-ptr-deref while probe() failed

I got a null-ptr-deref report as following when doing fault injection test:

BUG: kernel NULL pointer dereference, address: 0000000000000058
Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 PID: 253 Comm: 507-spi-dm9051 Tainted: G    B            N 6.1.0-rc3+
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:klist_put+0x2d/0xd0
Call Trace:
 &lt;TASK&gt;
 klist_remove+0xf1/0x1c0
 device_release_driver_internal+0x23e/0x2d0
 bus_remove_device+0x1bd/0x240
 device_del+0x357/0x770
 phy_device_remove+0x11/0x30
 mdiobus_unregister+0xa5/0x140
 release_nodes+0x6a/0xa0
 devres_release_all+0xf8/0x150
 device_unbind_cleanup+0x19/0xd0

//probe path:
phy_device_register()
  device_add()

phy_connect
  phy_attach_direct() //set device driver
    probe() //it's failed, driver is not bound
    device_bind_driver() // probe failed, it's not called

//remove path:
phy_device_remove()
  device_del()
    device_release_driver_internal()
      __device_release_driver() //dev-&gt;drv is not NULL
        klist_remove() &lt;- knode_driver is not added yet, cause null-ptr-deref

In phy_attach_direct(), after setting the 'dev-&gt;driver', probe() fails,
device_bind_driver() is not called, so the knode_driver-&gt;n_klist is not
set, then it causes null-ptr-deref in __device_release_driver() while
deleting device. Fix this by setting dev-&gt;driver to NULL in the error
path in phy_attach_direct().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49021/">CVE-2022-49021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49021">CVE-2022-49021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231939">SUSE bug 1231939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49022</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49022" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration

Fix possible out-of-bound access in ieee80211_get_rate_duration routine
as reported by the following UBSAN report:

UBSAN: array-index-out-of-bounds in net/mac80211/airtime.c:455:47
index 15 is out of range for type 'u16 [12]'
CPU: 2 PID: 217 Comm: kworker/u32:10 Not tainted 6.1.0-060100rc3-generic
Hardware name: Acer Aspire TC-281/Aspire TC-281, BIOS R01-A2 07/18/2017
Workqueue: mt76 mt76u_tx_status_data [mt76_usb]
Call Trace:
 &lt;TASK&gt;
 show_stack+0x4e/0x61
 dump_stack_lvl+0x4a/0x6f
 dump_stack+0x10/0x18
 ubsan_epilogue+0x9/0x43
 __ubsan_handle_out_of_bounds.cold+0x42/0x47
ieee80211_get_rate_duration.constprop.0+0x22f/0x2a0 [mac80211]
 ? ieee80211_tx_status_ext+0x32e/0x640 [mac80211]
 ieee80211_calc_rx_airtime+0xda/0x120 [mac80211]
 ieee80211_calc_tx_airtime+0xb4/0x100 [mac80211]
 mt76x02_send_tx_status+0x266/0x480 [mt76x02_lib]
 mt76x02_tx_status_data+0x52/0x80 [mt76x02_lib]
 mt76u_tx_status_data+0x67/0xd0 [mt76_usb]
 process_one_work+0x225/0x400
 worker_thread+0x50/0x3e0
 ? process_one_work+0x400/0x400
 kthread+0xe9/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49023</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49023" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix buffer overflow in elem comparison

For vendor elements, the code here assumes that 5 octets
are present without checking. Since the element itself is
already checked to fit, we only need to check the length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233022">SUSE bug 1233022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49024</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49024" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods

In m_can_pci_remove() and error handling path of m_can_pci_probe(),
m_can_class_free_dev() should be called to free resource allocated by
m_can_class_allocate_dev(), otherwise there will be memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49025</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49025" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix use-after-free when reverting termination table

When having multiple dests with termination tables and second one
or afterwards fails the driver reverts usage of term tables but
doesn't reset the assignment in attr-&gt;dests[num_vport_dests].termtbl
which case a use-after-free when releasing the rule.
Fix by resetting the assignment of termtbl to null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233023">SUSE bug 1233023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49026</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49026" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49026" ref_url="https://www.suse.com/security/cve/CVE-2022-49026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

e100: Fix possible use after free in e100_xmit_prepare

In e100_xmit_prepare(), if we can't map the skb, then return -ENOMEM, so
e100_xmit_frame() will return NETDEV_TX_BUSY and the upper layer will
resend the skb. But the skb is already freed, which will cause UAF bug
when the upper layer resends the skb.

Remove the harmful free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49026/">CVE-2022-49026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49026">CVE-2022-49026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231997">SUSE bug 1231997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49027</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49027" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49027" ref_url="https://www.suse.com/security/cve/CVE-2022-49027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix error handling in iavf_init_module()

The iavf_init_module() won't destroy workqueue when pci_register_driver()
failed. Call destroy_workqueue() when pci_register_driver() failed to
prevent the resource leak.

Similar to the handling of u132_hcd_init in commit f276e002793c
("usb: u132-hcd: fix resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49027/">CVE-2022-49027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49027">CVE-2022-49027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232007">SUSE bug 1232007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49028</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbevf: Fix resource leak in ixgbevf_init_module()

ixgbevf_init_module() won't destroy the workqueue created by
create_singlethread_workqueue() when pci_register_driver() failed. Add
destroy_workqueue() in fail path to prevent the resource leak.

Similar to the handling of u132_hcd_init in commit f276e002793c
("usb: u132-hcd: fix resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49029</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49029" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails

Smatch report warning as follows:

drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn:
  '&amp;data-&gt;list' not removed from list

If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will
be freed, but data-&gt;list will not be removed from driver_data.bmc_data,
then list traversal may cause UAF.

Fix by removeing it from driver_data.bmc_data before free().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49031</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49031" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49031" ref_url="https://www.suse.com/security/cve/CVE-2022-49031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: health: afe4403: Fix oob read in afe4403_read_raw

KASAN report out-of-bounds read as follows:

BUG: KASAN: global-out-of-bounds in afe4403_read_raw+0x42e/0x4c0
Read of size 4 at addr ffffffffc02ac638 by task cat/279

Call Trace:
 afe4403_read_raw
 iio_read_channel_info
 dev_attr_show

The buggy address belongs to the variable:
 afe4403_channel_leds+0x18/0xffffffffffffe9e0

This issue can be reproduced by singe command:

 $ cat /sys/bus/spi/devices/spi0.0/iio\:device0/in_intensity6_raw

The array size of afe4403_channel_leds is less than channels, so access
with chan-&gt;address cause OOB read in afe4403_read_raw. Fix it by moving
access before use it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49031/">CVE-2022-49031 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49031">CVE-2022-49031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231992">SUSE bug 1231992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49032</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49032" ref_url="https://www.suse.com/security/cve/CVE-2022-49032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: health: afe4404: Fix oob read in afe4404_[read|write]_raw

KASAN report out-of-bounds read as follows:

BUG: KASAN: global-out-of-bounds in afe4404_read_raw+0x2ce/0x380
Read of size 4 at addr ffffffffc00e4658 by task cat/278

Call Trace:
 afe4404_read_raw
 iio_read_channel_info
 dev_attr_show

The buggy address belongs to the variable:
 afe4404_channel_leds+0x18/0xffffffffffffe9c0

This issue can be reproduce by singe command:

 $ cat /sys/bus/i2c/devices/0-0058/iio\:device0/in_intensity6_raw

The array size of afe4404_channel_leds and afe4404_channel_offdacs
are less than channels, so access with chan-&gt;address cause OOB read
in afe4404_[read|write]_raw. Fix it by moving access before use them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49032/">CVE-2022-49032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49032">CVE-2022-49032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231991">SUSE bug 1231991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0160</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    A deadlock flaw was found in the Linux kernel's BPF subsystem. This flaw allows a local user to potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0330</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0330" ref_url="https://www.suse.com/security/cve/CVE-2023-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0330/">CVE-2023-0330 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207205">SUSE bug 1207205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803593" comment="qemu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775441" comment="qemu-accel-tcg-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775442" comment="qemu-arm-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803594" comment="qemu-audio-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803595" comment="qemu-block-curl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803596" comment="qemu-chardev-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803597" comment="qemu-guest-agent-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803598" comment="qemu-hw-display-qxl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803599" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803600" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803601" comment="qemu-hw-usb-redirect-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775380" comment="qemu-ipxe-1.0.0+-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775454" comment="qemu-s390x-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775388" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775389" comment="qemu-sgabios-8-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803602" comment="qemu-tools-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803603" comment="qemu-ui-opengl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803604" comment="qemu-ui-spice-core-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775398" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775459" comment="qemu-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1206</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel's IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1544</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1544" ref_url="https://www.suse.com/security/cve/CVE-2023-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1544/">CVE-2023-1544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1544">CVE-2023-1544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209554">SUSE bug 1209554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853099" comment="qemu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852955" comment="qemu-accel-tcg-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852956" comment="qemu-arm-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853100" comment="qemu-audio-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853101" comment="qemu-block-curl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853102" comment="qemu-chardev-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853103" comment="qemu-guest-agent-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853104" comment="qemu-hw-display-qxl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853105" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853106" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853107" comment="qemu-hw-usb-redirect-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852795" comment="qemu-ipxe-1.0.0+-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852968" comment="qemu-s390x-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852803" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852804" comment="qemu-sgabios-8-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853108" comment="qemu-tools-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853109" comment="qemu-ui-opengl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853110" comment="qemu-ui-spice-core-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852813" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852973" comment="qemu-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211188">SUSE bug 1211188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="TID000021588" ref_url="https://www.suse.com/support/kb/doc/?id=000021588" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210619">SUSE bug 1210619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220886">SUSE bug 1220886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228311">SUSE bug 1228311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802096" comment="suse-module-tools-15.5.3-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802364" comment="suse-module-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1859</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210169">SUSE bug 1210169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1916" ref_url="https://www.suse.com/security/cve/CVE-2023-1916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1916/">CVE-2023-1916 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916">CVE-2023-1916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210231">SUSE bug 1210231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210457">SUSE bug 1210457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20519</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20519" ref_url="https://www.suse.com/security/cve/CVE-2023-20519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.













    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20519/">CVE-2023-20519 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20519">CVE-2023-20519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20521</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20521" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20521" ref_url="https://www.suse.com/security/cve/CVE-2023-20521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20521/">CVE-2023-20521 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20521">CVE-2023-20521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20526</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20526" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20533</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20533" ref_url="https://www.suse.com/security/cve/CVE-2023-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-20533/">CVE-2023-20533 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20533">CVE-2023-20533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20566" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20566" ref_url="https://www.suse.com/security/cve/CVE-2023-20566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20566/">CVE-2023-20566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20566">CVE-2023-20566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20588</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 








    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810607" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20592</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20592" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035892.html" source="SUSE-SU"/>
    <description>
    Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.













    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215823">SUSE bug 1215823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2137</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2137" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OJ2D7Q6EV4EW53HYRQAZZUTECASLJC3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOK6KL3HWOEESQP5YYTJH4ANDT2XMQRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVMVZHYNGC7MNXWYYPCKCBLKKYAGFJPY/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210618">SUSE bug 1210618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210660">SUSE bug 1210660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813076" comment="libsqlite3-0-3.44.0-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153745" comment="libsqlite3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813077" comment="sqlite3-tcl-3.44.0-150000.3.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009722601" comment="sqlite3-tcl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2163</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    Incorrect verifier pruning in BPF in Linux Kernel &gt;=5.4 leads to unsafe
code paths being incorrectly marked as safe, resulting in arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215518">SUSE bug 1215518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215519">SUSE bug 1215519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2166</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2177</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files.
This issue affects libeconf: before 0.5.2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2283</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211190">SUSE bug 1211190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017690.html" source="SUSE-SU"/>
    <description>
    In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802096" comment="suse-module-tools-15.5.3-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802364" comment="suse-module-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017138.html" source="SUSE-SU"/>
    <description>
    Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-15"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220178">SUSE bug 1220178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810835" comment="ucode-intel-20231114-150200.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24023</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25433</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25433" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25433" ref_url="https://www.suse.com/security/cve/CVE-2023-25433" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25433/">CVE-2023-25433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25433">CVE-2023-25433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212883">SUSE bug 1212883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26364</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26364" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26364" ref_url="https://www.suse.com/security/cve/CVE-2023-26364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1415-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1415-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035088.html" source="SUSE-SU"/>
    <description>
    @adobe/css-tools version 4.3.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a minor denial of service while attempting to parse CSS. Exploitation of this issue does not require user interaction or privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26364/">CVE-2023-26364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26364">CVE-2023-26364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217322">SUSE bug 1217322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857607" comment="cockpit-wicked-5~git8.c06c55b-150500.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857608" comment="cockpit-wicked is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212398">SUSE bug 1212398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212881">SUSE bug 1212881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27043</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0329-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
    <description>
    The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222537">SUSE bug 1222537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848499" comment="libpython3_6m1_0-3.6.15-150300.10.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848500" comment="python3-3.6.15-150300.10.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848501" comment="python3-base-3.6.15-150300.10.54.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2731</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211478">SUSE bug 1211478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815623" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009960019" comment="dnsmasq-2.90-150400.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2861" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2861" ref_url="https://www.suse.com/security/cve/CVE-2023-2861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036649.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2861/">CVE-2023-2861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212968">SUSE bug 1212968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803593" comment="qemu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775441" comment="qemu-accel-tcg-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775442" comment="qemu-arm-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803594" comment="qemu-audio-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803595" comment="qemu-block-curl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803596" comment="qemu-chardev-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803597" comment="qemu-guest-agent-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803598" comment="qemu-hw-display-qxl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803599" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803600" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803601" comment="qemu-hw-usb-redirect-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775380" comment="qemu-ipxe-1.0.0+-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775454" comment="qemu-s390x-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775388" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775389" comment="qemu-sgabios-8-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803602" comment="qemu-tools-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803603" comment="qemu-ui-opengl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803604" comment="qemu-ui-spice-core-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775398" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775459" comment="qemu-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="TID000021404" ref_url="https://www.suse.com/support/kb/doc/?id=000021404" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852929" comment="xen-libs-4.17.3_08-150500.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2908" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2908" ref_url="https://www.suse.com/security/cve/CVE-2023-2908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in Libtiff's tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2908/">CVE-2023-2908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2908">CVE-2023-2908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212888">SUSE bug 1212888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29383</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29383" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29383" ref_url="https://www.suse.com/security/cve/CVE-2023-29383" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036530.html" source="SUSE-SU"/>
    <description>
    In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29383/">CVE-2023-29383 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29383">CVE-2023-29383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210507">SUSE bug 1210507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852276" comment="login_defs-4.8.1-150500.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670997" comment="login_defs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852277" comment="shadow-4.8.1-150500.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166874" comment="shadow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29483</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29483" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2605-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019447.html" source="SUSE-SU"/>
    <description>
    eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222693">SUSE bug 1222693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009943081" comment="python3-dnspython-1.15.0-150000.3.10.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877341" comment="python3-dnspython is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30078" ref_url="https://www.suse.com/security/cve/CVE-2023-30078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30078/">CVE-2023-30078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30078">CVE-2023-30078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214597">SUSE bug 1214597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214598">SUSE bug 1214598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3019</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213269">SUSE bug 1213269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857841" comment="qemu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857819" comment="qemu-accel-tcg-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857820" comment="qemu-arm-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857842" comment="qemu-audio-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857843" comment="qemu-block-curl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857844" comment="qemu-chardev-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857845" comment="qemu-guest-agent-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857846" comment="qemu-hw-display-qxl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857847" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857848" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857849" comment="qemu-hw-usb-redirect-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857772" comment="qemu-ipxe-1.0.0+-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857832" comment="qemu-s390x-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857780" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857781" comment="qemu-sgabios-8-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857850" comment="qemu-tools-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857851" comment="qemu-ui-opengl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857852" comment="qemu-ui-spice-core-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857790" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857837" comment="qemu-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30608</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30608" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:1637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:1637-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:1637-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015453.html" source="SUSE-SU"/>
    <description>
    sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227303">SUSE bug 1227303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202331022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31022</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31022" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31022" ref_url="https://www.suse.com/security/cve/CVE-2023-31022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017028.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability in the kernel mode layer, where a NULL-pointer dereference may lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31022/">CVE-2023-31022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31022">CVE-2023-31022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216826">SUSE bug 1216826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809081" comment="kernel-firmware-nvidia-gspx-G06-535.129.03-150500.11.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809085" comment="nvidia-open-driver-G06-signed-kmp-default-535.129.03_k5.14.21_150500.55.31-150500.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31085" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-&gt;erasesize), used indirectly by ctrl_cdev_ioctl, when mtd-&gt;erasesize is 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210778">SUSE bug 1210778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31315</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31315" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019965.html" source="SUSE-SU"/>
    <description>
    Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-12-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229069">SUSE bug 1229069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940343" comment="kernel-firmware-all-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677871" comment="kernel-firmware-all is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940344" comment="kernel-firmware-amdgpu-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677872" comment="kernel-firmware-amdgpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940345" comment="kernel-firmware-ath10k-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677873" comment="kernel-firmware-ath10k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940346" comment="kernel-firmware-ath11k-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677874" comment="kernel-firmware-ath11k is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940347" comment="kernel-firmware-atheros-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677875" comment="kernel-firmware-atheros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940348" comment="kernel-firmware-bluetooth-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677876" comment="kernel-firmware-bluetooth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940349" comment="kernel-firmware-bnx2-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677877" comment="kernel-firmware-bnx2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940350" comment="kernel-firmware-brcm-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677878" comment="kernel-firmware-brcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940351" comment="kernel-firmware-chelsio-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677879" comment="kernel-firmware-chelsio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940352" comment="kernel-firmware-dpaa2-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677880" comment="kernel-firmware-dpaa2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940353" comment="kernel-firmware-i915-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677881" comment="kernel-firmware-i915 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940354" comment="kernel-firmware-intel-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677882" comment="kernel-firmware-intel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940355" comment="kernel-firmware-iwlwifi-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677883" comment="kernel-firmware-iwlwifi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940356" comment="kernel-firmware-liquidio-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677884" comment="kernel-firmware-liquidio is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940357" comment="kernel-firmware-marvell-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677885" comment="kernel-firmware-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940358" comment="kernel-firmware-media-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677886" comment="kernel-firmware-media is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940359" comment="kernel-firmware-mediatek-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677887" comment="kernel-firmware-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940360" comment="kernel-firmware-mellanox-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677888" comment="kernel-firmware-mellanox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940361" comment="kernel-firmware-mwifiex-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677889" comment="kernel-firmware-mwifiex is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940362" comment="kernel-firmware-network-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677890" comment="kernel-firmware-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940363" comment="kernel-firmware-nfp-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677891" comment="kernel-firmware-nfp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940364" comment="kernel-firmware-nvidia-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677892" comment="kernel-firmware-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940365" comment="kernel-firmware-platform-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677893" comment="kernel-firmware-platform is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940366" comment="kernel-firmware-prestera-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677894" comment="kernel-firmware-prestera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940367" comment="kernel-firmware-qcom-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698055" comment="kernel-firmware-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940368" comment="kernel-firmware-qlogic-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677895" comment="kernel-firmware-qlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940369" comment="kernel-firmware-radeon-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677896" comment="kernel-firmware-radeon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940370" comment="kernel-firmware-realtek-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677897" comment="kernel-firmware-realtek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940371" comment="kernel-firmware-serial-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677898" comment="kernel-firmware-serial is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940372" comment="kernel-firmware-sound-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677899" comment="kernel-firmware-sound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940373" comment="kernel-firmware-ti-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677900" comment="kernel-firmware-ti is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940374" comment="kernel-firmware-ueagle-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677901" comment="kernel-firmware-ueagle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940375" comment="kernel-firmware-usb-network-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677902" comment="kernel-firmware-usb-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940376" comment="ucode-amd-20230724-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167634" comment="ucode-amd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3164</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3164" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3164" ref_url="https://www.suse.com/security/cve/CVE-2023-3164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2028-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035959.html" source="SUSE-SU"/>
    <description>
    A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-14"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3164/">CVE-2023-3164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164">CVE-2023-3164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212233">SUSE bug 1212233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865820" comment="libtiff5-4.0.9-150000.45.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3180" ref_url="https://www.suse.com/security/cve/CVE-2023-3180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3180/">CVE-2023-3180 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3180">CVE-2023-3180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213925">SUSE bug 1213925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814273" comment="qemu-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814247" comment="qemu-accel-tcg-x86-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814248" comment="qemu-arm-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814274" comment="qemu-audio-spice-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814275" comment="qemu-block-curl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814276" comment="qemu-chardev-spice-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814277" comment="qemu-guest-agent-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814278" comment="qemu-hw-display-qxl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814279" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814280" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814281" comment="qemu-hw-usb-redirect-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814185" comment="qemu-ipxe-1.0.0+-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814260" comment="qemu-s390x-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814193" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814194" comment="qemu-sgabios-8-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814282" comment="qemu-tools-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814283" comment="qemu-ui-opengl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814284" comment="qemu-ui-spice-core-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814203" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814265" comment="qemu-x86-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32181</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32181" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32181" ref_url="https://www.suse.com/security/cve/CVE-2023-32181" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files
This issue affects libeconf: before 0.5.2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32181/">CVE-2023-32181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32181">CVE-2023-32181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009791545" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670995" comment="libeconf0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32360</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016733.html" source="SUSE-SU"/>
    <description>
    An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797298" comment="cups-config-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797299" comment="libcups2-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3255</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213001">SUSE bug 1213001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803593" comment="qemu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775441" comment="qemu-accel-tcg-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775442" comment="qemu-arm-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803594" comment="qemu-audio-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803595" comment="qemu-block-curl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803596" comment="qemu-chardev-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803597" comment="qemu-guest-agent-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803598" comment="qemu-hw-display-qxl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803599" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803600" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803601" comment="qemu-hw-usb-redirect-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775380" comment="qemu-ipxe-1.0.0+-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775454" comment="qemu-s390x-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775388" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775389" comment="qemu-sgabios-8-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803602" comment="qemu-tools-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803603" comment="qemu-ui-opengl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803604" comment="qemu-ui-spice-core-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775398" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775459" comment="qemu-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32731</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32731" ref_url="https://www.suse.com/security/cve/CVE-2023-32731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in  https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32731/">CVE-2023-32731 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212180">SUSE bug 1212180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848276" comment="libabsl2308_0_0-20230802.1-150400.10.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848319" comment="libabsl2308_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848281" comment="libprotobuf-lite25_1_0-25.1-150400.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848324" comment="libprotobuf-lite25_1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32732</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32732" ref_url="https://www.suse.com/security/cve/CVE-2023-32732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in  https://github.com/grpc/grpc/pull/32309 https://www.google.com/url 

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32732/">CVE-2023-32732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212182">SUSE bug 1212182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:20233301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3301</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213414">SUSE bug 1213414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803593" comment="qemu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775441" comment="qemu-accel-tcg-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775442" comment="qemu-arm-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803594" comment="qemu-audio-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803595" comment="qemu-block-curl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803596" comment="qemu-chardev-spice-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803597" comment="qemu-guest-agent-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803598" comment="qemu-hw-display-qxl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803599" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803600" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803601" comment="qemu-hw-usb-redirect-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775380" comment="qemu-ipxe-1.0.0+-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775454" comment="qemu-s390x-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775388" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775389" comment="qemu-sgabios-8-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803602" comment="qemu-tools-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803603" comment="qemu-ui-opengl-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803604" comment="qemu-ui-spice-core-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775398" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009775459" comment="qemu-x86-7.1.0-150500.49.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3316</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212535">SUSE bug 1212535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33204</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020063.html" source="SUSE-SU"/>
    <description>
    sysstat through 12.7.2 allows a multiplication integer overflow in check_overflow in common.c. NOTE: this issue exists because of an incomplete fix for CVE-2022-39377.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211507">SUSE bug 1211507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217270">SUSE bug 1217270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009959147" comment="sysstat-12.0.2-150000.3.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247516" comment="sysstat is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3354</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3354" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212850">SUSE bug 1212850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814273" comment="qemu-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814247" comment="qemu-accel-tcg-x86-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814248" comment="qemu-arm-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814274" comment="qemu-audio-spice-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814275" comment="qemu-block-curl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814276" comment="qemu-chardev-spice-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814277" comment="qemu-guest-agent-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814278" comment="qemu-hw-display-qxl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814279" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814280" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814281" comment="qemu-hw-usb-redirect-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814185" comment="qemu-ipxe-1.0.0+-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814260" comment="qemu-s390x-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814193" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814194" comment="qemu-sgabios-8-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814282" comment="qemu-tools-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814283" comment="qemu-ui-opengl-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814284" comment="qemu-ui-spice-core-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814203" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814265" comment="qemu-x86-7.1.0-150500.49.9.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33953" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33953" ref_url="https://www.suse.com/security/cve/CVE-2023-33953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:

- Unbounded memory buffering in the HPACK parser
- Unbounded CPU consumption in the HPACK parser

The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.

The unbounded memory buffering bugs:

- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.
- HPACK varints have an encoding quirk whereby an infinite number of 0's can be added at the start of an integer. gRPC's hpack parser needed to read all of them before concluding a parse.
- gRPC's metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc…
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-11-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33953/">CVE-2023-33953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214148">SUSE bug 1214148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202334049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34049</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202311:15242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017369.html" source="SUSE-SU"/>
    <description>
    The Salt-SSH pre-flight option copies the script to the target at a predictable path, which allows an attacker to force Salt-SSH to run their script. If an attacker has access to the target VM and knows the path to the pre-flight script before it runs they can ensure Salt-SSH runs their script with the privileges of the user running Salt-SSH. Do not make the copy path on the target predictable and ensure we check return codes of the scp command if the copy fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-09"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215157">SUSE bug 1215157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809299" comment="python3-salt-3006.0-150500.4.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809291" comment="python3-simplejson-3.17.2-150300.3.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809307" comment="python3-simplejson is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809300" comment="salt-3006.0-150500.4.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809301" comment="salt-minion-3006.0-150500.4.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809302" comment="salt-transactional-update-3006.0-150500.4.24.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34058</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803782" comment="libvmtools0-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803783" comment="open-vm-tools-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34059</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the 
/dev/uinput file descriptor allowing them to simulate user inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225967">SUSE bug 1225967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803782" comment="libvmtools0-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803783" comment="open-vm-tools-12.3.0-150300.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34319</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    The fix for XSA-423 added logic to Linux'es netback driver to deal with
a frontend splitting a packet in a way such that not all of the headers
would come in one piece.  Unfortunately the logic introduced there
didn't account for the extreme case of the entire packet being split
into as many pieces as permitted by the protocol, yet still being
smaller than the area that's specially dealt with to keep all (possible)
headers together.  Such an unusual packet would therefore trigger a
buffer overrun in the driver.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    For migration as well as to work around kernels unaware of L1TF (see
XSA-273), PV guests may be run in shadow paging mode.  Since Xen itself
needs to be mapped when PV guests run, Xen and shadowed PV guests run
directly the respective shadow page tables.  For 64-bit PV guests this
means running on the shadow of the guest root page table.

In the course of dealing with shortage of memory in the shadow pool
associated with a domain, shadows of page tables may be torn down.  This
tearing down may include the shadow root page table that the CPU in
question is presently running on.  While a precaution exists to
supposedly prevent the tearing down of the underlying live page table,
the time window covered by that precaution isn't large enough.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810607" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34323</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34323" ref_url="https://www.suse.com/security/cve/CVE-2023-34323" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
    <description>
    When a transaction is committed, C Xenstored will first check
the quota is correct before attempting to commit any nodes.  It would
be possible that accounting is temporarily negative if a node has
been removed outside of the transaction.

Unfortunately, some versions of C Xenstored are assuming that the
quota cannot be negative and are using assert() to confirm it.  This
will lead to C Xenstored crash when tools are built without -DNDEBUG
(this is the default).

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34323/">CVE-2023-34323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34323">CVE-2023-34323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215744">SUSE bug 1215744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801382" comment="xen-libs-4.17.2_06-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34324</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
    <description>
    Closing of an event channel in the Linux kernel can result in a deadlock.
This happens when the close is being performed in parallel to an unrelated
Xen console action and the handling of a Xen console interrupt in an
unprivileged guest.

The closing of an event channel is e.g. triggered by removal of a
paravirtual device on the other side. As this action will cause console
messages to be issued on the other side quite often, the chance of
triggering the deadlock is not neglectable.

Note that 32-bit Arm-guests are not affected, as the 32-bit Linux kernel
on Arm doesn't use queued-RW-locks, which are required to trigger the
issue (on Arm32 a waiting writer doesn't block further readers to get
the lock).

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215745">SUSE bug 1215745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34325</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

libfsimage contains parsing code for several filesystems, most of them based on
grub-legacy code.  libfsimage is used by pygrub to inspect guest disks.

Pygrub runs as the same user as the toolstack (root in a priviledged domain).

At least one issue has been reported to the Xen Security Team that allows an
attacker to trigger a stack buffer overflow in libfsimage.  After further
analisys the Xen Security Team is no longer confident in the suitability of
libfsimage when run against guest controlled input with super user priviledges.

In order to not affect current deployments that rely on pygrub patches are
provided in the resolution section of the advisory that allow running pygrub in
deprivileged mode.

CVE-2023-4949 refers to the original issue in the upstream grub
project ("An attacker with local access to a system (either through a
disk or external drive) can present a modified XFS partition to
grub-legacy in such a way to exploit a memory corruption in grub's XFS
file system implementation.")  CVE-2023-34325 refers specifically to
the vulnerabilities in Xen's copy of libfsimage, which is decended
from a very old version of grub.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810607" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34326</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    The caching invalidation guidelines from the AMD-Vi specification (48882—Rev
3.07-PUB—Oct 2022) is incorrect on some hardware, as devices will malfunction
(see stale DMA mappings) if some fields of the DTE are updated but the IOMMU
TLB is not flushed.

Such stale DMA mappings can point to memory ranges not owned by the guest, thus
allowing access to unindented memory regions.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810607" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
    a previous vCPUs debug mask state.

 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
    This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
    up the CPU entirely.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810607" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34328</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
    <description>
    
[This CNA information record relates to multiple CVEs; the
text explains which aspects/vulnerabilities correspond to which CVE.]

AMD CPUs since ~2014 have extensions to normal x86 debugging functionality.
Xen supports guests using these extensions.

Unfortunately there are errors in Xen's handling of the guest state, leading
to denials of service.

 1) CVE-2023-34327 - An HVM vCPU can end up operating in the context of
    a previous vCPUs debug mask state.

 2) CVE-2023-34328 - A PV vCPU can place a breakpoint over the live GDT.
    This allows the PV vCPU to exploit XSA-156 / CVE-2015-8104 and lock
    up the CPU entirely.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810607" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3576</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213273">SUSE bug 1213273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35827</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35945" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html" source="SUSE-SU"/>
    <description>
    Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy's HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215713">SUSE bug 1215713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009798971" comment="libnghttp2-14-1.40.0-150200.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.

We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213584">SUSE bug 1213584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3618</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213274">SUSE bug 1213274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3758</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3758" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035531.html" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223100">SUSE bug 1223100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859900" comment="libsss_certmap0-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231790" comment="libsss_certmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859901" comment="libsss_idmap0-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859902" comment="libsss_nss_idmap0-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859903" comment="sssd-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859904" comment="sssd-common-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009632505" comment="sssd-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859905" comment="sssd-krb5-common-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009859906" comment="sssd-ldap-2.5.2-150500.10.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3777</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215097">SUSE bug 1215097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Not a Security Issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38289</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38289" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38289" ref_url="https://www.suse.com/security/cve/CVE-2023-38289" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Not a Security Issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38289/">CVE-2023-38289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38289">CVE-2023-38289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213589">SUSE bug 1213589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808033" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035724.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216598">SUSE bug 1216598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852272" comment="avahi-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852273" comment="libavahi-client3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852274" comment="libavahi-common3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852275" comment="libavahi-core7-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38470</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035174.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215947">SUSE bug 1215947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810251" comment="avahi-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810252" comment="libavahi-client3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810253" comment="libavahi-common3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810254" comment="libavahi-core7-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38471</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035724.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216594">SUSE bug 1216594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852272" comment="avahi-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852273" comment="libavahi-client3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852274" comment="libavahi-common3-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852275" comment="libavahi-core7-0.8-150400.7.16.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38472</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035208.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216853">SUSE bug 1216853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814965" comment="avahi-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814966" comment="libavahi-client3-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814967" comment="libavahi-common3-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814968" comment="libavahi-core7-0.8-150400.7.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38473</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017450.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216419">SUSE bug 1216419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810251" comment="avahi-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810252" comment="libavahi-client3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810253" comment="libavahi-common3-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810254" comment="libavahi-core7-0.8-150400.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38545</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
    <description>
    This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.

The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215888">SUSE bug 1215888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801459" comment="curl-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801460" comment="libcurl4-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4045-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017403.html" source="SUSE-SU"/>
    <description>
    This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).

If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215889">SUSE bug 1215889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801459" comment="curl-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801460" comment="libcurl4-8.0.1-150400.5.32.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38575</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213603">SUSE bug 1213603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219704">SUSE bug 1219704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39189</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39189" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216046">SUSE bug 1216046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39191</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39191" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215863">SUSE bug 1215863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215887">SUSE bug 1215887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215858">SUSE bug 1215858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215861">SUSE bug 1215861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39197</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39198</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217116">SUSE bug 1217116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219703">SUSE bug 1219703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39368</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3961" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215907">SUSE bug 1215907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801468" comment="samba-client-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3666-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031569.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801463" comment="libxml2-2-2.10.3-150500.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801464" comment="libxml2-tools-2.10.3-150500.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801465" comment="python3-libxml2-2.10.3-150500.5.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0070-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017615.html" source="SUSE-SU"/>
    <description>
    In GNU tar before 1.35, mishandled extension attributes in a PAX archive can lead to an application crash in xheader.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217969">SUSE bug 1217969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816615" comment="tar-1.34-150000.3.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40217</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217524">SUSE bug 1217524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218319">SUSE bug 1218319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218476">SUSE bug 1218476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218965">SUSE bug 1218965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219713">SUSE bug 1219713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221582">SUSE bug 1221582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224883">SUSE bug 1224883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009794920" comment="libpython3_6m1_0-3.6.15-150300.10.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009794921" comment="python3-3.6.15-150300.10.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009794922" comment="python3-base-3.6.15-150300.10.51.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40283</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4287-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017600.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** 

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains 
that target AArch64 allows an attacker to exploit an existing buffer 
overflow in dynamically-sized local variables in your application 
without this being detected. This stack-protector failure only applies 
to C99-style dynamically-sized local variables or those created using 
alloca(). The stack-protector operates as intended for statically-sized 
local variables.

The default behavior when the stack-protector 
detects an overflow is to terminate your application, resulting in 
controlled loss of availability. An attacker who can exploit a buffer 
overflow without triggering the stack-protector might be able to change 
program flow control to cause an uncontrolled loss of availability or to
 go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.






    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-24"/>
	<updated date="2024-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228298">SUSE bug 1228298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809550" comment="libgcc_s1-13.2.1+git7813-150000.1.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152931" comment="libgcc_s1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009809551" comment="libstdc++6-13.2.1+git7813-150000.1.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152962" comment="libstdc++6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215099">SUSE bug 1215099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40547</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215098">SUSE bug 1215098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40548</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215100">SUSE bug 1215100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40549</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215101">SUSE bug 1215101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40550</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215102">SUSE bug 1215102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40551</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:0001" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035120.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215103">SUSE bug 1215103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40660" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016707.html" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215762">SUSE bug 1215762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801458" comment="opensc-0.22.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40661" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016707.html" source="SUSE-SU"/>
    <description>
    Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow 
compromise key generation, certificate loading, and other card management operations during enrollment.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215761">SUSE bug 1215761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801458" comment="opensc-0.22.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214687">SUSE bug 1214687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4091</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215904">SUSE bug 1215904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801468" comment="samba-client-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41175</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41175" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214686">SUSE bug 1214686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851902" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4128</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208.  Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4133</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4133" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4134</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4134" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4147</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215118">SUSE bug 1215118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4154" ref_url="https://www.suse.com/security/cve/CVE-2023-4154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A design flaw was found in Samba's DirSync control implementation, which exposes passwords and secrets in Active Directory to privileged users and Read-Only Domain Controllers (RODCs). This flaw allows RODCs and users possessing the GET_CHANGES right to access all attributes, including sensitive secrets and passwords. Even in a default setup, RODC DC accounts, which should only replicate some passwords, can gain access to all domain secrets, including the vital krbtgt, effectively eliminating the RODC / DC distinction. Furthermore, the vulnerability fails to account for error conditions (fail open), like out-of-memory situations, potentially granting access to secret attributes, even under low-privileged attacker influence.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4154/">CVE-2023-4154 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4154">CVE-2023-4154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215908">SUSE bug 1215908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801468" comment="samba-client-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4155</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214022">SUSE bug 1214022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode-&gt;i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4244</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.

We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215424">SUSE bug 1215424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42465</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0794-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0795-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0796-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0797-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0876-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018176.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219026">SUSE bug 1219026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221593">SUSE bug 1221593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224872">SUSE bug 1224872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851289" comment="sudo-1.9.12p1-150500.7.10.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151407" comment="sudo is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42667" ref_url="https://www.suse.com/security/cve/CVE-2023-42667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
    <description>
    Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42667/">CVE-2023-42667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42669</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215905">SUSE bug 1215905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801468" comment="samba-client-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42670" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42670" ref_url="https://www.suse.com/security/cve/CVE-2023-42670" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42670/">CVE-2023-42670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42670">CVE-2023-42670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215906">SUSE bug 1215906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801468" comment="samba-client-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4273</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214123">SUSE bug 1214123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
    <description>
    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-&gt;nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218613">SUSE bug 1218613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42754" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215467">SUSE bug 1215467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42755</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42755" ref_url="https://www.suse.com/security/cve/CVE-2023-42755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42755/">CVE-2023-42755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215702">SUSE bug 1215702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43490</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
    <description>
    Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43785</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215683">SUSE bug 1215683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43786</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215684">SUSE bug 1215684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43787</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215685">SUSE bug 1215685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799872" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151817" comment="libX11-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151819" comment="libX11-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799873" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151821" comment="libX11-xcb1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4352-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800538" comment="python3-urllib3-1.25.10-150300.4.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4387</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4389" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214351">SUSE bug 1214351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44487</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="TID000021240" ref_url="https://www.suse.com/support/kb/doc/?id=000021240" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TNFN6MBU4SQLAGX7GNFLRGTPGY3IBHZG/" source="SUSE-SU"/>
    <description>
    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216169">SUSE bug 1216169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216171">SUSE bug 1216171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216174">SUSE bug 1216174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216176">SUSE bug 1216176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216181">SUSE bug 1216181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216182">SUSE bug 1216182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216190">SUSE bug 1216190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813392" comment="kubevirt-manifests-1.1.0-150500.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813401" comment="kubevirt-virtctl-1.1.0-150500.8.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848276" comment="libabsl2308_0_0-20230802.1-150400.10.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848319" comment="libabsl2308_0_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802970" comment="libnghttp2-14-1.40.0-150200.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848281" comment="libprotobuf-lite25_1_0-25.1-150400.9.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848324" comment="libprotobuf-lite25_1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4459</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4459" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in vmxnet3_rq_cleanup in drivers/net/vmxnet3/vmxnet3_drv.c in the networking sub-component in vmxnet3 in the Linux Kernel. This issue may allow a local attacker with normal user privilege to cause a denial of service due to a missing sanity check during cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4504</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4504" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016733.html" source="SUSE-SU"/>
    <description>
    Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215204">SUSE bug 1215204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217457">SUSE bug 1217457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217553">SUSE bug 1217553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218317">SUSE bug 1218317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218347">SUSE bug 1218347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221585">SUSE bug 1221585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797298" comment="cups-config-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009797299" comment="libcups2-2.2.7-150000.3.51.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45142</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45142" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4POHOO6U2FW5XKZT7HPGZAJF7LQQW3W4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0220-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNDMJCVODSMOIFD655EHBVQRLNUDXLQK/" source="SUSE-SU"/>
    <description>
    OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. A handler wrapper out of the box adds labels `http.user_agent` and `http.method` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent to it. HTTP header User-Agent or HTTP method for requests can be easily set by an attacker to be random and long. The library internally uses `httpconv.ServerRequest` that records every value for HTTP `method` and `User-Agent`. In order to be affected, a program has to use the `otelhttp.NewHandler` wrapper and not filter any unknown HTTP methods or User agents on the level of CDN, LB, previous middleware, etc. Version 0.44.0 fixed this issue when the values collected for attribute `http.request.method` were changed to be restricted to a set of well-known values and other high cardinality attributes were removed. As a workaround to stop being affected, `otelhttp.WithFilter()` can be used, but it requires manual careful configuration to not log certain requests entirely. For convenience and safe usage of this library, it should by default mark with the label `unknown` non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228553">SUSE bug 1228553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942538" comment="containerd-1.7.21-150000.117.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958498" comment="docker-26.1.5_ce-150000.212.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3155-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4SYE7WTKUNXNTHQW42V7UBGJBEQBHRTP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZZCCVQLIJ7QABQ7SEQNIICQGIOXKWPA/" source="SUSE-SU"/>
    <description>
    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868463" comment="containerd-1.7.17-150000.111.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017191.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216129">SUSE bug 1216129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810377" comment="libxml2-2-2.10.3-150500.5.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810378" comment="libxml2-tools-2.10.3-150500.5.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810379" comment="python3-libxml2-2.10.3-150500.5.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45539</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8849" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035891.html" source="SUSE-SU"/>
    <description>
    HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217653">SUSE bug 1217653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814269" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.19.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4563</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4563" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This was assigned as a duplicate of CVE-2023-4244.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214727">SUSE bug 1214727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799819" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799820" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45803</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000678.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4352-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035989.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-17"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009803402" comment="python3-urllib3-1.25.10-150300.4.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036532.html" source="SUSE-SU"/>
    <description>
    MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216378">SUSE bug 1216378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802616" comment="libz1-1.2.13-150500.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153971" comment="libz1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802617" comment="zlib-devel-1.2.13-150500.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251909" comment="zlib-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45862" ref_url="https://www.suse.com/security/cve/CVE-2023-45862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45862/">CVE-2023-45862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216051">SUSE bug 1216051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45913" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45913" ref_url="https://www.suse.com/security/cve/CVE-2023-45913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037166.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Mesa v23.0.4 was discovered to contain a NULL pointer dereference via the function dri2GetGlxDrawableFromXDrawableId(). This vulnerability is triggered when the X11 server sends an DRI2_BufferSwapComplete event unexpectedly when the application is using DRI3. NOTE: this is disputed because there is no scenario in which the vulnerability was demonstrated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45913/">CVE-2023-45913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45913">CVE-2023-45913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222040">SUSE bug 1222040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946114" comment="Mesa-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276538" comment="Mesa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946115" comment="Mesa-dri-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276542" comment="Mesa-dri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946116" comment="Mesa-gallium-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276548" comment="Mesa-gallium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946117" comment="Mesa-libEGL1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276551" comment="Mesa-libEGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946118" comment="Mesa-libGL1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276554" comment="Mesa-libGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946119" comment="Mesa-libglapi0-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276569" comment="Mesa-libglapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946120" comment="libgbm1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276582" comment="libgbm1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45918" ref_url="https://www.suse.com/security/cve/CVE-2023-45918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1133-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036538.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-45918/">CVE-2023-45918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45918">CVE-2023-45918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220061">SUSE bug 1220061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853557" comment="libncurses6-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853558" comment="ncurses-utils-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853559" comment="terminfo-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853560" comment="terminfo-base-6.1-150000.5.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45919" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45919" ref_url="https://www.suse.com/security/cve/CVE-2023-45919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037166.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Mesa 23.0.4 was discovered to contain a buffer over-read in glXQueryServerString(). NOTE: this is disputed because there are no common situations in which users require uninterrupted operation with an attacker-controller server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45919/">CVE-2023-45919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45919">CVE-2023-45919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222041">SUSE bug 1222041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946114" comment="Mesa-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276538" comment="Mesa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946115" comment="Mesa-dri-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276542" comment="Mesa-dri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946116" comment="Mesa-gallium-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276548" comment="Mesa-gallium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946117" comment="Mesa-libEGL1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276551" comment="Mesa-libEGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946118" comment="Mesa-libGL1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276554" comment="Mesa-libGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946119" comment="Mesa-libglapi0-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276569" comment="Mesa-libglapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946120" comment="libgbm1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276582" comment="libgbm1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45922</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45922" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45922" ref_url="https://www.suse.com/security/cve/CVE-2023-45922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037166.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** glx_pbuffer.c in Mesa 23.0.4 was discovered to contain a segmentation violation when calling __glXGetDrawableAttribute(). NOTE: this is disputed because there are no common situations in which users require uninterrupted operation with an attacker-controller server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45922/">CVE-2023-45922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45922">CVE-2023-45922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222042">SUSE bug 1222042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946114" comment="Mesa-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276538" comment="Mesa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946115" comment="Mesa-dri-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276542" comment="Mesa-dri is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946116" comment="Mesa-gallium-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276548" comment="Mesa-gallium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946117" comment="Mesa-libEGL1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276551" comment="Mesa-libEGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946118" comment="Mesa-libGL1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276554" comment="Mesa-libGL1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946119" comment="Mesa-libglapi0-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276569" comment="Mesa-libglapi0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946120" comment="libgbm1-22.3.5-150500.77.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276582" comment="libgbm1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46103</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017305.html" source="SUSE-SU"/>
    <description>
    This flaw allows a malicious HTTP server to set "super cookies" in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with `domain=co.UK` when the URL used a lower
case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217573">SUSE bug 1217573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815364" comment="curl-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815365" comment="libcurl4-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46219</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46219" ref_url="https://www.suse.com/security/cve/CVE-2023-46219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
    <description>
    When saving HSTS data to an excessively long file name, curl could end up
removing all contents, making subsequent requests using that file unaware of
the HSTS status they should otherwise use.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46219/">CVE-2023-46219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217574">SUSE bug 1217574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815364" comment="curl-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815365" comment="libcurl4-8.0.1-150400.5.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.

The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.

We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215442">SUSE bug 1215442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219699">SUSE bug 1219699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46228</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46228" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46228" ref_url="https://www.suse.com/security/cve/CVE-2023-46228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2432-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036531.html" source="SUSE-SU"/>
    <description>
    zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c, lib/comp/zstd/zstd.c, lib/dl/multipart.c, or lib/header.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46228/">CVE-2023-46228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46228">CVE-2023-46228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216268">SUSE bug 1216268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009802976" comment="libzck1-1.1.16-150400.3.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009803766" comment="libzck1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4623</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.

If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.

We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215440">SUSE bug 1215440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219698">SUSE bug 1219698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46246</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46246" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46246" ref_url="https://www.suse.com/security/cve/CVE-2023-46246" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46246/">CVE-2023-46246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216696">SUSE bug 1216696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46316</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035983.html" source="SUSE-SU"/>
    <description>
    In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216591">SUSE bug 1216591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813366" comment="traceroute-2.0.21-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814074" comment="traceroute is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4641</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036530.html" source="SUSE-SU"/>
    <description>
    A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214806">SUSE bug 1214806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852276" comment="login_defs-4.8.1-150500.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670997" comment="login_defs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852277" comment="shadow-4.8.1-150500.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166874" comment="shadow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-07"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216896">SUSE bug 1216896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017515.html" source="SUSE-SU"/>
    <description>
    The current setup of the quarantine page tables assumes that the
quarantine domain (dom_io) has been initialized with an address width
of DEFAULT_DOMAIN_ADDRESS_WIDTH (48) and hence 4 page table levels.

However dom_io being a PV domain gets the AMD-Vi IOMMU page tables
levels based on the maximum (hot pluggable) RAM address, and hence on
systems with no RAM above the 512GB mark only 3 page-table levels are
configured in the IOMMU.

On systems without RAM above the 512GB boundary
amd_iommu_quarantine_init() will setup page tables for the scratch
page with 4 levels, while the IOMMU will be configured to use 3 levels
only, resulting in the last page table directory (PDE) effectively
becoming a page table entry (PTE), and hence a device in quarantine
mode gaining write access to the page destined to be a PDE.

Due to this page table level mismatch, the sink page the device gets
read/write access to is no longer cleared between device assignment,
possibly leading to data leaks.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216654">SUSE bug 1216654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817485" comment="xen-libs-4.17.3_02-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46836</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017515.html" source="SUSE-SU"/>
    <description>
    The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative
Return Stack Overflow) are not IRQ-safe.  It was believed that the
mitigations always operated in contexts with IRQs disabled.

However, the original XSA-254 fix for Meltdown (XPTI) deliberately left
interrupts enabled on two entry paths; one unconditionally, and one
conditionally on whether XPTI was active.

As BTC/SRSO and Meltdown affect different CPU vendors, the mitigations
are not active together by default.  Therefore, there is a race
condition whereby a malicious PV guest can bypass BTC/SRSO protections
and launch a BTC/SRSO attack against Xen.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216807">SUSE bug 1216807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817485" comment="xen-libs-4.17.3_02-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    Transmit requests in Xen's virtual network protocol can consist of
multiple parts.  While not really useful, except for the initial part
any of them may be of zero length, i.e. carry no data at all.  Besides a
certain initial portion of the to be transferred data, these parts are
directly translated into what Linux calls SKB fragments.  Such converted
request parts can, when for a particular SKB they are all of length
zero, lead to a de-reference of NULL in core networking code.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46839</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/034056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018142.html" source="SUSE-SU"/>
    <description>
    PCI devices can make use of a functionality called phantom functions,
that when enabled allows the device to generate requests using the IDs
of functions that are otherwise unpopulated.  This allows a device to
extend the number of outstanding requests.

Such phantom functions need an IOMMU context setup, but failure to
setup the context is not fatal when the device is assigned.  Not
failing device assignment when such failure happens can lead to the
primary device being assigned to a guest, while some of the phantom
functions are assigned to a different domain.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218851">SUSE bug 1218851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850672" comment="xen-libs-4.17.3_06-150500.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46840" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46840" ref_url="https://www.suse.com/security/cve/CVE-2023-46840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/034056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018142.html" source="SUSE-SU"/>
    <description>
    Incorrect placement of a preprocessor directive in source code results
in logic that doesn't operate as intended when support for HVM guests is
compiled out of Xen.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46840/">CVE-2023-46840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46840">CVE-2023-46840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219080">SUSE bug 1219080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850672" comment="xen-libs-4.17.3_06-150500.3.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46841" ref_url="https://www.suse.com/security/cve/CVE-2023-46841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
    <description>
    Recent x86 CPUs offer functionality named Control-flow Enforcement
Technology (CET).  A sub-feature of this are Shadow Stacks (CET-SS).
CET-SS is a hardware feature designed to protect against Return Oriented
Programming attacks. When enabled, traditional stacks holding both data
and return addresses are accompanied by so called "shadow stacks",
holding little more than return addresses.  Shadow stacks aren't
writable by normal instructions, and upon function returns their
contents are used to check for possible manipulation of a return address
coming from the traditional stack.

In particular certain memory accesses need intercepting by Xen.  In
various cases the necessary emulation involves kind of replaying of
the instruction.  Such replaying typically involves filling and then
invoking of a stub.  Such a replayed instruction may raise an
exceptions, which is expected and dealt with accordingly.

Unfortunately the interaction of both of the above wasn't right:
Recovery involves removal of a call frame from the (traditional) stack.
The counterpart of this operation for the shadow stack was missing.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46841/">CVE-2023-46841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46841">CVE-2023-46841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219885">SUSE bug 1219885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852929" comment="xen-libs-4.17.3_08-150500.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036194.html" source="SUSE-SU"/>
    <description>
    Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and
other modes.  This in particular means that they may set registers used
to pass 32-bit-mode hypercall arguments to values outside of the range
32-bit code would be able to set them to.

When processing of hypercalls takes a considerable amount of time,
the hypervisor may choose to invoke a hypercall continuation.  Doing so
involves putting (perhaps updated) hypercall arguments in respective
registers.  For guests not running in 64-bit mode this further involves
a certain amount of translation of the values.

Unfortunately internal sanity checking of these translated values
assumes high halves of registers to always be clear when invoking a
hypercall.  When this is found not to be the case, it triggers a
consistency check in the hypervisor and causes a crash.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221984">SUSE bug 1221984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877609" comment="xen-libs-4.17.4_04-150500.3.33.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016765.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-21"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215935">SUSE bug 1215935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217434">SUSE bug 1217434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217555">SUSE bug 1217555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219709">SUSE bug 1219709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221589">SUSE bug 1221589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227915">SUSE bug 1227915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801466" comment="grub2-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801149" comment="grub2-arm64-efi-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801153" comment="grub2-i386-pc-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801159" comment="grub2-s390x-emu-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801162" comment="grub2-snapper-plugin-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801164" comment="grub2-x86_64-efi-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801167" comment="grub2-x86_64-xen-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016765.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215936">SUSE bug 1215936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801466" comment="grub2-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801149" comment="grub2-arm64-efi-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801153" comment="grub2-i386-pc-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801159" comment="grub2-s390x-emu-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801162" comment="grub2-snapper-plugin-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801164" comment="grub2-x86_64-efi-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009801167" comment="grub2-x86_64-xen-2.06-150500.29.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202347108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47108</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47108" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PE3D4WEFUCELLDKJUEM2KLPFMME7KTAI/" source="SUSE-SU"/>
    <description>
    OpenTelemetry-Go Contrib is a collection of third-party packages for OpenTelemetry-Go. Prior to version 0.46.0, the grpc Unary Server Interceptor out of the box adds labels `net.peer.sock.addr` and `net.peer.sock.port` that have unbound cardinality. It leads to the server's potential memory exhaustion when many malicious requests are sent. An attacker can easily flood the peer address and port for requests. Version 0.46.0 contains a fix for this issue. As a workaround to stop being affected, a view removing the attributes can be used. The other possibility is to disable grpc metrics instrumentation by passing `otelgrpc.WithMeterProvider` option with `noop.NewMeterProvider`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217070">SUSE bug 1217070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942538" comment="containerd-1.7.21-150000.117.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153864" comment="containerd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958498" comment="docker-26.1.5_ce-150000.212.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202347233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4733" ref_url="https://www.suse.com/security/cve/CVE-2023-4733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1840.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4733/">CVE-2023-4733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4733">CVE-2023-4733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215004">SUSE bug 1215004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4734</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4734" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214925">SUSE bug 1214925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214924">SUSE bug 1214924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4738" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214922">SUSE bug 1214922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4750</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4750" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4750" ref_url="https://www.suse.com/security/cve/CVE-2023-4750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1857.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4750/">CVE-2023-4750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4750">CVE-2023-4750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215005">SUSE bug 1215005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4752</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1858.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215006">SUSE bug 1215006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4781</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4781" ref_url="https://www.suse.com/security/cve/CVE-2023-4781" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4781/">CVE-2023-4781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4781">CVE-2023-4781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215033">SUSE bug 1215033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215457">SUSE bug 1215457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4785</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4785" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4785" ref_url="https://www.suse.com/security/cve/CVE-2023-4785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
    <description>
    Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. 
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-11-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4785/">CVE-2023-4785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4785">CVE-2023-4785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215334">SUSE bug 1215334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202347855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) TDX module software before version 1.5.05.46.698 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-25"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016723.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215286">SUSE bug 1215286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800217" comment="glibc-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800218" comment="glibc-devel-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800219" comment="glibc-locale-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800220" comment="glibc-locale-base-2.31-150300.63.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48231</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48231" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48231" ref_url="https://www.suse.com/security/cve/CVE-2023-48231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48231/">CVE-2023-48231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217316">SUSE bug 1217316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48232" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48232" ref_url="https://www.suse.com/security/cve/CVE-2023-48232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48232/">CVE-2023-48232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217320">SUSE bug 1217320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48233" ref_url="https://www.suse.com/security/cve/CVE-2023-48233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. If the count after the :s command is larger than what fits into a (signed) long variable, abort with e_value_too_large. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `ac6378773` which has been included in release version 9.0.2108. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48233/">CVE-2023-48233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217321">SUSE bug 1217321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48234</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48234" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48234" ref_url="https://www.suse.com/security/cve/CVE-2023-48234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When getting the count for a normal mode z command, it may overflow for large counts given. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `58f9befca1` which has been included in release version 9.0.2109. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48234/">CVE-2023-48234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217324">SUSE bug 1217324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48235" ref_url="https://www.suse.com/security/cve/CVE-2023-48235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When parsing relative ex addresses one may unintentionally cause an
overflow. Ironically this happens in the existing overflow check, because the line number becomes negative and LONG_MAX - lnum will cause the overflow. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `060623e` which has been included in release version 9.0.2110. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48235/">CVE-2023-48235 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217326">SUSE bug 1217326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48236</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48236" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48236" ref_url="https://www.suse.com/security/cve/CVE-2023-48236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger
than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-48236/">CVE-2023-48236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217329">SUSE bug 1217329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48237</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48237" ref_url="https://www.suse.com/security/cve/CVE-2023-48237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit `6bf131888` which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48237/">CVE-2023-48237 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217330">SUSE bug 1217330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48706</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48706" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48706" ref_url="https://www.suse.com/security/cve/CVE-2023-48706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a `:s` command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes free-ing of memory which may later then be accessed by the initial `:s` command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48706/">CVE-2023-48706 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217432">SUSE bug 1217432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48795</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021295" ref_url="https://www.suse.com/support/kb/doc/?id=000021295" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7UNBVBZXNPUVRYGXMQJVWO63X7TAJUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNYVAEZZNHEKG5C7JHU5U3MPN73U4OKG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L45IOOVVBSIBE7RRRVUWOWDGUABBZE4Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXSOYCFCX44QUQ434BAHHQRSSCB3KZG5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJ4UKYMVT5L6QOJVM6JMV6AQINAVT4JW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PE3D4WEFUCELLDKJUEM2KLPFMME7KTAI/" source="SUSE-SU"/>
    <description>
    The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848194" comment="libssh2-1-1.11.0-150000.4.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152658" comment="libssh2-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817184" comment="openssh-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817185" comment="openssh-clients-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817186" comment="openssh-common-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817187" comment="openssh-fips-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009817188" comment="openssh-server-8.4p1-150300.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4881</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49083</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035893.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217592">SUSE bug 1217592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009813786" comment="python3-cryptography-3.3.2-150400.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238251" comment="python3-cryptography is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49141</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49141" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49141" ref_url="https://www.suse.com/security/cve/CVE-2023-49141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
    <description>
    Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49141/">CVE-2023-49141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation.

When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().

We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215300">SUSE bug 1215300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220906">SUSE bug 1220906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224418">SUSE bug 1224418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50229</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50229" ref_url="https://www.suse.com/security/cve/CVE-2023-50229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50229/">CVE-2023-50229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50229">CVE-2023-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218300">SUSE bug 1218300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009844272" comment="libbluetooth3-5.65-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50230</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50230" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50230" ref_url="https://www.suse.com/security/cve/CVE-2023-50230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20938.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50230/">CVE-2023-50230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50230">CVE-2023-50230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218301">SUSE bug 1218301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009844272" comment="libbluetooth3-5.65-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009165954" comment="libbluetooth3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50387</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
    <description>
    Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220717">SUSE bug 1220717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009960019" comment="dnsmasq-2.90-150400.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50495</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50495" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50495" ref_url="https://www.suse.com/security/cve/CVE-2023-50495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017439.html" source="SUSE-SU"/>
    <description>
    NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50495/">CVE-2023-50495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">CVE-2023-50495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218014">SUSE bug 1218014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816335" comment="libncurses6-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158858" comment="libncurses6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816336" comment="ncurses-utils-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158863" comment="ncurses-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816337" comment="terminfo-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158865" comment="terminfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009816338" comment="terminfo-base-6.1-150000.5.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009158866" comment="terminfo-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50782</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50782" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14416-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/" source="SUSE-SU"/>
    <description>
    A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218043">SUSE bug 1218043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950235" comment="libopenssl-1_1-devel-1.1.1l-150500.17.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950236" comment="libopenssl1_1-1.1.1l-150500.17.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950237" comment="libopenssl1_1-hmac-1.1.1l-150500.17.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950238" comment="openssl-1_1-1.1.1l-150500.17.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
    <description>
    The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009960019" comment="dnsmasq-2.90-150400.16.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152784" comment="dnsmasq is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51042</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51043</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51385</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018919.html" source="SUSE-SU"/>
    <description>
    In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218215">SUSE bug 1218215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848742" comment="openssh-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848743" comment="openssh-clients-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848744" comment="openssh-common-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848745" comment="openssh-fips-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153169" comment="openssh-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848746" comment="openssh-server-8.4p1-150300.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5158</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51779</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034860.html" source="SUSE-SU"/>
    <description>
    bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218610">SUSE bug 1218610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5178</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215768">SUSE bug 1215768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216044">SUSE bug 1216044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808715" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808716" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51780</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218733">SUSE bug 1218733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51782</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5197</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.

We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52160</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0764-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036997.html" source="SUSE-SU"/>
    <description>
    The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219975">SUSE bug 1219975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850152" comment="wpa_supplicant-2.10-150500.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152145" comment="wpa_supplicant is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52340</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219296">SUSE bug 1219296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52356</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017992.html" source="SUSE-SU"/>
    <description>
    A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219213">SUSE bug 1219213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848747" comment="libtiff5-4.0.9-150000.45.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52425</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036667.html" source="SUSE-SU"/>
    <description>
    libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853566" comment="libexpat1-2.4.4-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52429</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to (in alloc_targets) allocate more than INT_MAX bytes, and crash, because of a missing check for struct dm_ioctl.target_count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52435</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52435" ref_url="https://www.suse.com/security/cve/CVE-2023-52435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: prevent mss overflow in skb_segment()

Once again syzbot is able to crash the kernel in skb_segment() [1]

GSO_BY_FRAGS is a forbidden value, but unfortunately the following
computation in skb_segment() can reach it quite easily :

	mss = mss * partial_segs;

65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to
a bad final result.

Make sure to limit segmentation so that the new mss value is smaller
than GSO_BY_FRAGS.

[1]

general protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]
CPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551
Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00
RSP: 0018:ffffc900043473d0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597
RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070
RBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0
R13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046
FS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
udp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109
ipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120
skb_mac_gso_segment+0x290/0x610 net/core/gso.c:53
__skb_gso_segment+0x339/0x710 net/core/gso.c:124
skb_gso_segment include/net/gso.h:83 [inline]
validate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626
__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
packet_xmit+0x257/0x380 net/packet/af_packet.c:276
packet_snd net/packet/af_packet.c:3087 [inline]
packet_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0xd5/0x180 net/socket.c:745
__sys_sendto+0x255/0x340 net/socket.c:2190
__do_sys_sendto net/socket.c:2202 [inline]
__se_sys_sendto net/socket.c:2198 [inline]
__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7f8692032aa9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9
RDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003
RBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480
R13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003
&lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551
Code: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00
RSP: 0018:ffffc900043473d0 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597
RDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070
RBP: ffffc90004347578 R0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52435/">CVE-2023-52435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220138">SUSE bug 1220138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52439</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio: Fix use-after-free in uio_open

core-1				core-2
-------------------------------------------------------
uio_unregister_device		uio_open
				idev = idr_find()
device_unregister(&amp;idev-&gt;dev)
put_device(&amp;idev-&gt;dev)
uio_device_release
				get_device(&amp;idev-&gt;dev)
kfree(idev)
uio_free_minor(minor)
				uio_release
				put_device(&amp;idev-&gt;dev)
				kfree(idev)
-------------------------------------------------------

In the core-1 uio_unregister_device(), the device_unregister will kfree
idev when the idev-&gt;dev kobject ref is 1. But after core-1
device_unregister, put_device and before doing kfree, the core-2 may
get_device. Then:
1. After core-1 kfree idev, the core-2 will do use-after-free for idev.
2. When core-2 do uio_release and put_device, the idev will be double
   freed.

To address this issue, we can get idev atomic &amp; inc idev reference with
minor_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52443</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52443" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

apparmor: avoid crash when parsed profile name is empty

When processing a packed profile in unpack_profile() described like

 "profile :ns::samba-dcerpcd /usr/lib*/samba/{,samba/}samba-dcerpcd {...}"

a string ":samba-dcerpcd" is unpacked as a fully-qualified name and then
passed to aa_splitn_fqname().

aa_splitn_fqname() treats ":samba-dcerpcd" as only containing a namespace.
Thus it returns NULL for tmpname, meanwhile tmpns is non-NULL. Later
aa_alloc_profile() crashes as the new profile name is NULL now.

general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 6 PID: 1657 Comm: apparmor_parser Not tainted 6.7.0-rc2-dirty #16
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
RIP: 0010:strlen+0x1e/0xa0
Call Trace:
 &lt;TASK&gt;
 ? strlen+0x1e/0xa0
 aa_policy_init+0x1bb/0x230
 aa_alloc_profile+0xb1/0x480
 unpack_profile+0x3bc/0x4960
 aa_unpack+0x309/0x15e0
 aa_replace_profiles+0x213/0x33c0
 policy_update+0x261/0x370
 profile_replace+0x20e/0x2a0
 vfs_write+0x2af/0xe00
 ksys_write+0x126/0x250
 do_syscall_64+0x46/0xf0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---
RIP: 0010:strlen+0x1e/0xa0

It seems such behaviour of aa_splitn_fqname() is expected and checked in
other places where it is called (e.g. aa_remove_profiles). Well, there
is an explicit comment "a ns name without a following profile is allowed"
inside.

AFAICS, nothing can prevent unpacked "name" to be in form like
":samba-dcerpcd" - it is passed from userspace.

Deny the whole profile set replacement in such case and inform user with
EPROTO and an explaining message.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52445</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52445" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pvrusb2: fix use after free on context disconnection

Upon module load, a kthread is created targeting the
pvr2_context_thread_func function, which may call pvr2_context_destroy
and thus call kfree() on the context object. However, that might happen
before the usb hub_event handler is able to notify the driver. This
patch adds a sanity check before the invalid read reported by syzbot,
within the context disconnection call stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220315">SUSE bug 1220315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52447</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Defer the free of inner map when necessary

When updating or deleting an inner map in map array or map htab, the map
may still be accessed by non-sleepable program or sleepable program.
However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map
directly through bpf_map_put(), if the ref-counter is the last one
(which is true for most cases), the inner map will be freed by
ops-&gt;map_free() in a kworker. But for now, most .map_free() callbacks
don't use synchronize_rcu() or its variants to wait for the elapse of a
RCU grace period, so after the invocation of ops-&gt;map_free completes,
the bpf program which is accessing the inner map may incur
use-after-free problem.

Fix the free of inner map by invoking bpf_map_free_deferred() after both
one RCU grace period and one tasks trace RCU grace period if the inner
map has been removed from the outer map before. The deferment is
accomplished by using call_rcu() or call_rcu_tasks_trace() when
releasing the last ref-counter of bpf map. The newly-added rcu_head
field in bpf_map shares the same storage space with work field to
reduce the size of bpf_map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52448</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump

Syzkaller has reported a NULL pointer dereference when accessing
rgd-&gt;rd_rgl in gfs2_rgrp_dump().  This can happen when creating
rgd-&gt;rd_gl fails in read_rindex_entry().  Add a NULL pointer check in
gfs2_rgrp_dump() to prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52449</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: Fix gluebi NULL pointer dereference caused by ftl notifier

If both ftl.ko and gluebi.ko are loaded, the notifier of ftl
triggers NULL pointer dereference when trying to access
'gluebi-&gt;desc' in gluebi_read().

ubi_gluebi_init
  ubi_register_volume_notifier
    ubi_enumerate_volumes
      ubi_notify_all
        gluebi_notify    nb-&gt;notifier_call()
          gluebi_create
            mtd_device_register
              mtd_device_parse_register
                add_mtd_device
                  blktrans_notify_add   not-&gt;add()
                    ftl_add_mtd         tr-&gt;add_mtd()
                      scan_header
                        mtd_read
                          mtd_read_oob
                            mtd_read_oob_std
                              gluebi_read   mtd-&gt;read()
                                gluebi-&gt;desc - NULL

Detailed reproduction information available at the Link [1],

In the normal case, obtain gluebi-&gt;desc in the gluebi_get_device(),
and access gluebi-&gt;desc in the gluebi_read(). However,
gluebi_get_device() is not executed in advance in the
ftl_add_mtd() process, which leads to NULL pointer dereference.

The solution for the gluebi module is to run jffs2 on the UBI
volume without considering working with ftl or mtdblock [2].
Therefore, this problem can be avoided by preventing gluebi from
creating the mtdblock device after creating mtd partition of the
type MTD_UBIVOLUME.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()

Get logical socket id instead of physical id in discover_upi_topology()
to avoid out-of-bound access on 'upi = &amp;type-&gt;topology[nid][idx];' line
that leads to NULL pointer dereference in upi_fill_topology()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52451</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/memhp: Fix access beyond end of drmem array

dlpar_memory_remove_by_index() may access beyond the bounds of the
drmem lmb array when the LMB lookup fails to match an entry with the
given DRC index. When the search fails, the cursor is left pointing to
&amp;drmem_info-&gt;lmbs[drmem_info-&gt;n_lmbs], which is one element past the
last valid entry in the array. The debug message at the end of the
function then dereferences this pointer:

        pr_debug("Failed to hot-remove memory at %llx\n",
                 lmb-&gt;base_addr);

This was found by inspection and confirmed with KASAN:

  pseries-hotplug-mem: Attempting to hot-remove LMB, drc index 1234
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in dlpar_memory+0x298/0x1658
  Read of size 8 at addr c000000364e97fd0 by task bash/949

  dump_stack_lvl+0xa4/0xfc (unreliable)
  print_report+0x214/0x63c
  kasan_report+0x140/0x2e0
  __asan_load8+0xa8/0xe0
  dlpar_memory+0x298/0x1658
  handle_dlpar_errorlog+0x130/0x1d0
  dlpar_store+0x18c/0x3e0
  kobj_attr_store+0x68/0xa0
  sysfs_kf_write+0xc4/0x110
  kernfs_fop_write_iter+0x26c/0x390
  vfs_write+0x2d4/0x4e0
  ksys_write+0xac/0x1a0
  system_call_exception+0x268/0x530
  system_call_vectored_common+0x15c/0x2ec

  Allocated by task 1:
   kasan_save_stack+0x48/0x80
   kasan_set_track+0x34/0x50
   kasan_save_alloc_info+0x34/0x50
   __kasan_kmalloc+0xd0/0x120
   __kmalloc+0x8c/0x320
   kmalloc_array.constprop.0+0x48/0x5c
   drmem_init+0x2a0/0x41c
   do_one_initcall+0xe0/0x5c0
   kernel_init_freeable+0x4ec/0x5a0
   kernel_init+0x30/0x1e0
   ret_from_kernel_user_thread+0x14/0x1c

  The buggy address belongs to the object at c000000364e80000
   which belongs to the cache kmalloc-128k of size 131072
  The buggy address is located 0 bytes to the right of
   allocated 98256-byte region [c000000364e80000, c000000364e97fd0)

  ==================================================================
  pseries-hotplug-mem: Failed to hot-remove memory at 0

Log failed lookups with a separate message and dereference the
cursor only when it points to a valid entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52452</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52452" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix accesses to uninit stack slots

Privileged programs are supposed to be able to read uninitialized stack
memory (ever since 6715df8d5) but, before this patch, these accesses
were permitted inconsistently. In particular, accesses were permitted
above state-&gt;allocated_stack, but not below it. In other words, if the
stack was already "large enough", the access was permitted, but
otherwise the access was rejected instead of being allowed to "grow the
stack". This undesired rejection was happening in two places:
- in check_stack_slot_within_bounds()
- in check_stack_range_initialized()
This patch arranges for these accesses to be permitted. A bunch of tests
that were relying on the old rejection had to change; all of them were
changed to add also run unprivileged, in which case the old behavior
persists. One tests couldn't be updated - global_func16 - because it
can't run unprivileged for other reasons.

This patch also fixes the tracking of the stack size for variable-offset
reads. This second fix is bundled in the same commit as the first one
because they're inter-related. Before this patch, writes to the stack
using registers containing a variable offset (as opposed to registers
with fixed, known values) were not properly contributing to the
function's needed stack size. As a result, it was possible for a program
to verify, but then to attempt to read out-of-bounds data at runtime
because a too small stack had been allocated for it.

Each function tracks the size of the stack it needs in
bpf_subprog_info.stack_depth, which is maintained by
update_stack_depth(). For regular memory accesses, check_mem_access()
was calling update_state_depth() but it was passing in only the fixed
part of the offset register, ignoring the variable offset. This was
incorrect; the minimum possible value of that register should be used
instead.

This tracking is now fixed by centralizing the tracking of stack size in
grow_stack_state(), and by lifting the calls to grow_stack_state() to
check_stack_access_within_bounds() as suggested by Andrii. The code is
now simpler and more convincingly tracks the correct maximum stack size.
check_stack_range_initialized() can now rely on enough stack having been
allocated for the access; this helps with the fix for the first issue.

A few tests were changed to also check the stack depth computation. The
one that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume

When the optional PRE_COPY support was added to speed up the device
compatibility check, it failed to update the saving/resuming data
pointers based on the fd offset. This results in migration data
corruption and when the device gets started on the destination the
following error is reported in some cases,

[  478.907684] arm-smmu-v3 arm-smmu-v3.2.auto: event 0x10 received:
[  478.913691] arm-smmu-v3 arm-smmu-v3.2.auto:  0x0000310200000010
[  478.919603] arm-smmu-v3 arm-smmu-v3.2.auto:  0x000002088000007f
[  478.925515] arm-smmu-v3 arm-smmu-v3.2.auto:  0x0000000000000000
[  478.931425] arm-smmu-v3 arm-smmu-v3.2.auto:  0x0000000000000000
[  478.947552] hisi_zip 0000:31:00.0: qm_axi_rresp [error status=0x1] found
[  478.955930] hisi_zip 0000:31:00.0: qm_db_timeout [error status=0x400] found
[  478.955944] hisi_zip 0000:31:00.0: qm sq doorbell timeout in function 2
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220337">SUSE bug 1220337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52454</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length

If the host sends an H2CData command with an invalid DATAL,
the kernel may crash in nvmet_tcp_build_pdu_iovec().

Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
lr : nvmet_tcp_io_work+0x6ac/0x718 [nvmet_tcp]
Call trace:
  process_one_work+0x174/0x3c8
  worker_thread+0x2d0/0x3e8
  kthread+0x104/0x110

Fix the bug by raising a fatal error if DATAL isn't coherent
with the packet size.
Also, the PDU length should never exceed the MAXH2CDATA parameter which
has been communicated to the host in nvmet_tcp_handle_icreq().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52456</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: imx: fix tx statemachine deadlock

When using the serial port as RS485 port, the tx statemachine is used to
control the RTS pin to drive the RS485 transceiver TX_EN pin. When the
TTY port is closed in the middle of a transmission (for instance during
userland application crash), imx_uart_shutdown disables the interface
and disables the Transmission Complete interrupt. afer that,
imx_uart_stop_tx bails on an incomplete transmission, to be retriggered
by the TC interrupt. This interrupt is disabled and therefore the tx
statemachine never transitions out of SEND. The statemachine is in
deadlock now, and the TX_EN remains low, making the interface useless.

imx_uart_stop_tx now checks for incomplete transmission AND whether TC
interrupts are enabled before bailing to be retriggered. This makes sure
the state machine handling is reached, and is properly set to
WAIT_AFTER_SEND.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52457</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed

Returning an error code from .remove() makes the driver core emit the
little helpful error message:

	remove callback returned a non-zero value. This will be ignored.

and then remove the device anyhow. So all resources that were not freed
are leaked in this case. Skipping serial8250_unregister_port() has the
potential to keep enough of the UART around to trigger a use-after-free.

So replace the error return (and with it the little helpful error
message) by a more useful error message and continue to cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52458</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: add check that partition length needs to be aligned with block size

Before calling add partition or resize partition, there is no check
on whether the length is aligned with the logical block size.
If the logical block size of the disk is larger than 512 bytes,
then the partition size maybe not the multiple of the logical block size,
and when the last sector is read, bio_truncate() will adjust the bio size,
resulting in an IO error if the size of the read command is smaller than
the logical block size.If integrity data is supported, this will also
result in a null pointer dereference when calling bio_integrity_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220428">SUSE bug 1220428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52462" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix check for attempt to corrupt spilled pointer

When register is spilled onto a stack as a 1/2/4-byte register, we set
slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,
depending on actual spill size). So to check if some stack slot has
spilled register we need to consult slot_type[7], not slot_type[0].

To avoid the need to remember and double-check this in the future, just
use is_spilled_reg() helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220325">SUSE bug 1220325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52463</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: force RO when remounting if SetVariable is not supported

If SetVariable at runtime is not supported by the firmware we never assign
a callback for that function. At the same time mount the efivarfs as
RO so no one can call that.  However, we never check the permission flags
when someone remounts the filesystem as RW. As a result this leads to a
crash looking like this:

$ mount -o remount,rw /sys/firmware/efi/efivars
$ efi-updatevar -f PK.auth PK

[  303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  303.280482] Mem abort info:
[  303.280854]   ESR = 0x0000000086000004
[  303.281338]   EC = 0x21: IABT (current EL), IL = 32 bits
[  303.282016]   SET = 0, FnV = 0
[  303.282414]   EA = 0, S1PTW = 0
[  303.282821]   FSC = 0x04: level 0 translation fault
[  303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000
[  303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
[  303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6
[  303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1
[  303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023
[  303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  303.292123] pc : 0x0
[  303.292443] lr : efivar_set_variable_locked+0x74/0xec
[  303.293156] sp : ffff800008673c10
[  303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000
[  303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027
[  303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000
[  303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000
[  303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54
[  303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4
[  303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002
[  303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201
[  303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc
[  303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000
[  303.303341] Call trace:
[  303.303679]  0x0
[  303.303938]  efivar_entry_set_get_size+0x98/0x16c
[  303.304585]  efivarfs_file_write+0xd0/0x1a4
[  303.305148]  vfs_write+0xc4/0x2e4
[  303.305601]  ksys_write+0x70/0x104
[  303.306073]  __arm64_sys_write+0x1c/0x28
[  303.306622]  invoke_syscall+0x48/0x114
[  303.307156]  el0_svc_common.constprop.0+0x44/0xec
[  303.307803]  do_el0_svc+0x38/0x98
[  303.308268]  el0_svc+0x2c/0x84
[  303.308702]  el0t_64_sync_handler+0xf4/0x120
[  303.309293]  el0t_64_sync+0x190/0x194
[  303.309794] Code: ???????? ???????? ???????? ???????? (????????)
[  303.310612] ---[ end trace 0000000000000000 ]---

Fix this by adding a .reconfigure() function to the fs operations which
we can use to check the requested flags and deny anything that's not RO
if the firmware doesn't implement SetVariable at runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52464</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/thunderx: Fix possible out-of-bounds string access

Enabling -Wstringop-overflow globally exposes a warning for a common bug
in the usage of strncat():

  drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr':
  drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=]
   1136 |                 strncat(msg, other, OCX_MESSAGE_SIZE);
        |                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   ...
   1145 |                                 strncat(msg, other, OCX_MESSAGE_SIZE);
   ...
   1150 |                                 strncat(msg, other, OCX_MESSAGE_SIZE);

   ...

Apparently the author of this driver expected strncat() to behave the
way that strlcat() does, which uses the size of the destination buffer
as its third argument rather than the length of the source buffer. The
result is that there is no check on the size of the allocated buffer.

Change it to strlcat().

  [ bp: Trim compiler output, fixup commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52467</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: syscon: Fix null pointer dereference in of_syscon_register()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/amd/pm: fix a use-after-free in kv_parse_power_table

When ps allocated by kzalloc equals to NULL, kv_parse_power_table
frees adev-&gt;pm.dpm.ps that allocated before. However, after the control
flow goes through the following call chains:

kv_parse_power_table
  |-&gt; kv_dpm_init
        |-&gt; kv_dpm_sw_init
	      |-&gt; kv_dpm_fini

The adev-&gt;pm.dpm.ps is used in the for loop of kv_dpm_fini after its
first free in kv_parse_power_table and causes a use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52470</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()

check the alloc_workqueue return value in radeon_crtc_init()
to avoid null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52474</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests

hfi1 user SDMA request processing has two bugs that can cause data
corruption for user SDMA requests that have multiple payload iovecs
where an iovec other than the tail iovec does not run up to the page
boundary for the buffer pointed to by that iovec.a

Here are the specific bugs:
1. user_sdma_txadd() does not use struct user_sdma_iovec-&gt;iov.iov_len.
   Rather, user_sdma_txadd() will add up to PAGE_SIZE bytes from iovec
   to the packet, even if some of those bytes are past
   iovec-&gt;iov.iov_len and are thus not intended to be in the packet.
2. user_sdma_txadd() and user_sdma_send_pkts() fail to advance to the
   next iovec in user_sdma_request-&gt;iovs when the current iovec
   is not PAGE_SIZE and does not contain enough data to complete the
   packet. The transmitted packet will contain the wrong data from the
   iovec pages.

This has not been an issue with SDMA packets from hfi1 Verbs or PSM2
because they only produce iovecs that end short of PAGE_SIZE as the tail
iovec of an SDMA request.

Fixing these bugs exposes other bugs with the SDMA pin cache
(struct mmu_rb_handler) that get in way of supporting user SDMA requests
with multiple payload iovecs whose buffers do not end at PAGE_SIZE. So
this commit fixes those issues as well.

Here are the mmu_rb_handler bugs that non-PAGE_SIZE-end multi-iovec
payload user SDMA requests can hit:
1. Overlapping memory ranges in mmu_rb_handler will result in duplicate
   pinnings.
2. When extending an existing mmu_rb_handler entry (struct mmu_rb_node),
   the mmu_rb code (1) removes the existing entry under a lock, (2)
   releases that lock, pins the new pages, (3) then reacquires the lock
   to insert the extended mmu_rb_node.

   If someone else comes in and inserts an overlapping entry between (2)
   and (3), insert in (3) will fail.

   The failure path code in this case unpins _all_ pages in either the
   original mmu_rb_node or the new mmu_rb_node that was inserted between
   (2) and (3).
3. In hfi1_mmu_rb_remove_unless_exact(), mmu_rb_node-&gt;refcount is
   incremented outside of mmu_rb_handler-&gt;lock. As a result, mmu_rb_node
   could be evicted by another thread that gets mmu_rb_handler-&gt;lock and
   checks mmu_rb_node-&gt;refcount before mmu_rb_node-&gt;refcount is
   incremented.
4. Related to #2 above, SDMA request submission failure path does not
   check mmu_rb_node-&gt;refcount before freeing mmu_rb_node object.

   If there are other SDMA requests in progress whose iovecs have
   pointers to the now-freed mmu_rb_node(s), those pointers to the
   now-freed mmu_rb nodes will be dereferenced when those SDMA requests
   complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52475</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: powermate - fix use-after-free in powermate_config_complete

syzbot has found a use-after-free bug [1] in the powermate driver. This
happens when the device is disconnected, which leads to a memory free from
the powermate_device struct.  When an asynchronous control message
completes after the kfree and its callback is invoked, the lock does not
exist anymore and hence the bug.

Use usb_kill_urb() on pm-&gt;config to cancel any in-progress requests upon
device disconnection.

[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52476</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/lbr: Filter vsyscall addresses

We found that a panic can occur when a vsyscall is made while LBR sampling
is active. If the vsyscall is interrupted (NMI) for perf sampling, this
call sequence can occur (most recent at top):

    __insn_get_emulate_prefix()
    insn_get_emulate_prefix()
    insn_get_prefixes()
    insn_get_opcode()
    decode_branch_type()
    get_branch_type()
    intel_pmu_lbr_filter()
    intel_pmu_handle_irq()
    perf_event_nmi_handler()

Within __insn_get_emulate_prefix() at frame 0, a macro is called:

    peek_nbyte_next(insn_byte_t, insn, i)

Within this macro, this dereference occurs:

    (insn)-&gt;next_byte

Inspecting registers at this point, the value of the next_byte field is the
address of the vsyscall made, for example the location of the vsyscall
version of gettimeofday() at 0xffffffffff600000. The access to an address
in the vsyscall region will trigger an oops due to an unhandled page fault.

To fix the bug, filtering for vsyscalls can be done when
determining the branch type. This patch will return
a "none" branch if a kernel address if found to lie in the
vsyscall region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52477</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: hub: Guard against accesses to uninitialized BOS descriptors

Many functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h
access fields inside udev-&gt;bos without checking if it was allocated and
initialized. If usb_get_bos_descriptor() fails for whatever
reason, udev-&gt;bos will be NULL and those accesses will result in a
crash:

BUG: kernel NULL pointer dereference, address: 0000000000000018
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 5 PID: 17818 Comm: kworker/5:1 Tainted: G W 5.15.108-18910-gab0e1cb584e1 #1 &lt;HASH:1f9e 1&gt;
Hardware name: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 02/03/2021
Workqueue: usb_hub_wq hub_event
RIP: 0010:hub_port_reset+0x193/0x788
Code: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 &lt;48&gt; 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9
RSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310
RDX: fffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840
RBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffffab740c53fd3e R14: 0000000000000032 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffffa1be96540000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0
Call Trace:
hub_event+0x73f/0x156e
? hub_activate+0x5b7/0x68f
process_one_work+0x1a2/0x487
worker_thread+0x11a/0x288
kthread+0x13a/0x152
? process_one_work+0x487/0x487
? kthread_associate_blkcg+0x70/0x70
ret_from_fork+0x1f/0x30

Fall back to a default behavior if the BOS descriptor isn't accessible
and skip all the functionalities that depend on it: LPM support checks,
Super Speed capabilitiy checks, U1/U2 states setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52478</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect

hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.

hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.

This opens the following races (note the below code is simplified):

1. Retrieving + printing the protocol (harmless race):

	if (!hidpp-&gt;protocol_major) {
		hidpp_root_get_protocol_version()
		hidpp-&gt;protocol_major = response.rap.params[0];
	}

We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:

[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.

Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:

2. Updating the name to the HIDPP name (harmless race):

	if (hidpp-&gt;name == hdev-&gt;name) {
		...
		hidpp-&gt;name = new_name;
	}

3. Initializing the power_supply class for the battery (problematic!):

hidpp_initialize_battery()
{
        if (hidpp-&gt;battery.ps)
                return 0;

	probe_battery(); /* Blocks, threads take turns executing this */

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);
}

4. Creating delayed input_device (potentially problematic):

	if (hidpp-&gt;delayed_input)
		return;

	hidpp-&gt;delayed_input = hidpp_allocate_input(hdev);

The really big problem here is 3. Hitting the race leads to the following
sequence:

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

	...

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.

Notice how:

1. This is all devm-maganaged
2. The hidpp-&gt;battery.desc struct is shared between the 2 power supplies
3. hidpp-&gt;battery.desc.properties points to the result from the second
   devm_kmemdup()

This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
   hidpp-&gt;battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
   this involves sending a remove uevent to userspace which invokes
   power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp-&gt;battery.desc.properties which
   now points to freed memory leading to backtraces like this one:

Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel:  ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel:  dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel:  kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52481</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52481" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: errata: Add Cortex-A520 speculative unprivileged load workaround

Implement the workaround for ARM Cortex-A520 erratum 2966298. On an
affected Cortex-A520 core, a speculatively executed unprivileged load
might leak data from a privileged load via a cache side channel. The
issue only exists for loads within a translation regime with the same
translation (e.g. same ASID and VMID). Therefore, the issue only affects
the return to EL0.

The workaround is to execute a TLBI before returning to EL0 after all
loads of privileged data. A non-shareable TLBI to any address is
sufficient.

The workaround isn't necessary if page table isolation (KPTI) is
enabled, but for simplicity it will be. Page table isolation should
normally be disabled for Cortex-A520 as it supports the CSV3 feature
and the E0PD feature (used when KASLR is enabled).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220887">SUSE bug 1220887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52482</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/srso: Add SRSO mitigation for Hygon processors

Add mitigation for the speculative return stack overflow vulnerability
which exists on Hygon processors too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range

When running an SVA case, the following soft lockup is triggered:
--------------------------------------------------------------------
watchdog: BUG: soft lockup - CPU#244 stuck for 26s!
pstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50
lr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50
sp : ffff8000d83ef290
x29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000
x26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000
x23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0
x20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0
x14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a
x2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001
Call trace:
 arm_smmu_cmdq_issue_cmdlist+0x178/0xa50
 __arm_smmu_tlb_inv_range+0x118/0x254
 arm_smmu_tlb_inv_range_asid+0x6c/0x130
 arm_smmu_mm_invalidate_range+0xa0/0xa4
 __mmu_notifier_invalidate_range_end+0x88/0x120
 unmap_vmas+0x194/0x1e0
 unmap_region+0xb4/0x144
 do_mas_align_munmap+0x290/0x490
 do_mas_munmap+0xbc/0x124
 __vm_munmap+0xa8/0x19c
 __arm64_sys_munmap+0x28/0x50
 invoke_syscall+0x78/0x11c
 el0_svc_common.constprop.0+0x58/0x1c0
 do_el0_svc+0x34/0x60
 el0_svc+0x2c/0xd4
 el0t_64_sync_handler+0x114/0x140
 el0t_64_sync+0x1a4/0x1a8
--------------------------------------------------------------------

Note that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed
to "arm_smmu_mm_arch_invalidate_secondary_tlbs", yet the problem remains.

The commit 06ff87bae8d3 ("arm64: mm: remove unused functions and variable
protoypes") fixed a similar lockup on the CPU MMU side. Yet, it can occur
to SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called
typically next to MMU tlb flush function, e.g.
	tlb_flush_mmu_tlbonly {
		tlb_flush {
			__flush_tlb_range {
				// check MAX_TLBI_OPS
			}
		}
		mmu_notifier_arch_invalidate_secondary_tlbs {
			arm_smmu_mm_arch_invalidate_secondary_tlbs {
				// does not check MAX_TLBI_OPS
			}
		}
	}

Clone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an
SVA case SMMU uses the CPU page table, so it makes sense to align with the
tlbflush code. Then, replace per-page TLBI commands with a single per-asid
TLBI command, if the request size hits this threshold.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52486</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Don't unref the same fb many times by mistake due to deadlock handling

If we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl()
we proceed to unref the fb and then retry the whole thing from the top.
But we forget to reset the fb pointer back to NULL, and so if we then
get another error during the retry, before the fb lookup, we proceed
the unref the same fb again without having gotten another reference.
The end result is that the fb will (eventually) end up being freed
while it's still in use.

Reset fb to NULL once we've unreffed it to avoid doing it again
until we've done another fb lookup.

This turned out to be pretty easy to hit on a DG2 when doing async
flips (and CONFIG_DEBUG_WW_MUTEX_SLOWPATH=y). The first symptom I
saw that drm_closefb() simply got stuck in a busy loop while walking
the framebuffer list. Fortunately I was able to convince it to oops
instead, and from there it was easier to track down the culprit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221277">SUSE bug 1221277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52488</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO

The SC16IS7XX IC supports a burst mode to access the FIFOs where the
initial register address is sent ($00), followed by all the FIFO data
without having to resend the register address each time. In this mode, the
IC doesn't increment the register address for each R/W byte.

The regmap_raw_read() and regmap_raw_write() are functions which can
perform IO over multiple registers. They are currently used to read/write
from/to the FIFO, and although they operate correctly in this burst mode on
the SPI bus, they would corrupt the regmap cache if it was not disabled
manually. The reason is that when the R/W size is more than 1 byte, these
functions assume that the register address is incremented and handle the
cache accordingly.

Convert FIFO R/W functions to use the regmap _noinc_ versions in order to
remove the manual cache control which was a workaround when using the
_raw_ versions. FIFO registers are properly declared as volatile so
cache will not be used/updated for FIFO accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221162">SUSE bug 1221162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52489</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/sparsemem: fix race in accessing memory_section-&gt;usage

The below race is observed on a PFN which falls into the device memory
region with the system memory configuration where PFN's are such that
[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL].  Since normal zone start and end
pfn contains the device memory PFN's as well, the compaction triggered
will try on the device memory PFN's too though they end up in NOP(because
pfn_to_online_page() returns NULL for ZONE_DEVICE memory sections).  When
from other core, the section mappings are being removed for the
ZONE_DEVICE region, that the PFN in question belongs to, on which
compaction is currently being operated is resulting into the kernel crash
with CONFIG_SPASEMEM_VMEMAP enabled.  The crash logs can be seen at [1].

compact_zone()			memunmap_pages
-------------			---------------
__pageblock_pfn_to_page
   ......
 (a)pfn_valid():
     valid_section()//return true
			      (b)__remove_pages()-&gt;
				  sparse_remove_section()-&gt;
				    section_deactivate():
				    [Free the array ms-&gt;usage and set
				     ms-&gt;usage = NULL]
     pfn_section_valid()
     [Access ms-&gt;usage which
     is NULL]

NOTE: From the above it can be said that the race is reduced to between
the pfn_valid()/pfn_section_valid() and the section deactivate with
SPASEMEM_VMEMAP enabled.

The commit b943f045a9af("mm/sparse: fix kernel crash with
pfn_section_valid check") tried to address the same problem by clearing
the SECTION_HAS_MEM_MAP with the expectation of valid_section() returns
false thus ms-&gt;usage is not accessed.

Fix this issue by the below steps:

a) Clear SECTION_HAS_MEM_MAP before freeing the -&gt;usage.

b) RCU protected read side critical section will either return NULL
   when SECTION_HAS_MEM_MAP is cleared or can successfully access -&gt;usage.

c) Free the -&gt;usage with kfree_rcu() and set ms-&gt;usage = NULL.  No
   attempt will be made to access -&gt;usage after this as the
   SECTION_HAS_MEM_MAP is cleared thus valid_section() return false.

Thanks to David/Pavan for their inputs on this patch.

[1] https://lore.kernel.org/linux-mm/994410bb-89aa-d987-1f50-f514903c55aa@quicinc.com/

On Snapdragon SoC, with the mentioned memory configuration of PFN's as
[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL], we are able to see bunch of
issues daily while testing on a device farm.

For this particular issue below is the log.  Though the below log is
not directly pointing to the pfn_section_valid(){ ms-&gt;usage;}, when we
loaded this dump on T32 lauterbach tool, it is pointing.

[  540.578056] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
[  540.578068] Mem abort info:
[  540.578070]   ESR = 0x0000000096000005
[  540.578073]   EC = 0x25: DABT (current EL), IL = 32 bits
[  540.578077]   SET = 0, FnV = 0
[  540.578080]   EA = 0, S1PTW = 0
[  540.578082]   FSC = 0x05: level 1 translation fault
[  540.578085] Data abort info:
[  540.578086]   ISV = 0, ISS = 0x00000005
[  540.578088]   CM = 0, WnR = 0
[  540.579431] pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBSBTYPE=--)
[  540.579436] pc : __pageblock_pfn_to_page+0x6c/0x14c
[  540.579454] lr : compact_zone+0x994/0x1058
[  540.579460] sp : ffffffc03579b510
[  540.579463] x29: ffffffc03579b510 x28: 0000000000235800 x27:000000000000000c
[  540.579470] x26: 0000000000235c00 x25: 0000000000000068 x24:ffffffc03579b640
[  540.579477] x23: 0000000000000001 x22: ffffffc03579b660 x21:0000000000000000
[  540.579483] x20: 0000000000235bff x19: ffffffdebf7e3940 x18:ffffffdebf66d140
[  540.579489] x17: 00000000739ba063 x16: 00000000739ba063 x15:00000000009f4bff
[  540.579495] x14: 0000008000000000 x13: 0000000000000000 x12:0000000000000001
[  540.579501] x11: 0000000000000000 x10: 0000000000000000 x9 :ffffff897d2cd440
[  540.579507] x8 : 0000000000000000 x7 : 0000000000000000 x6 :ffffffc03579b5b4
[  540.579512] x5 : 0000000000027f25 x4 : ffffffc03579b5b8 x3 :0000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52492</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fix NULL pointer in channel unregistration function

__dma_async_device_channel_register() can fail. In case of failure,
chan-&gt;local is freed (with free_percpu()), and chan-&gt;local is nullified.
When dma_async_device_unregister() is called (because of managed API or
intentionally by DMA controller driver), channels are unconditionally
unregistered, leading to this NULL pointer:
[    1.318693] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0
[...]
[    1.484499] Call trace:
[    1.486930]  device_del+0x40/0x394
[    1.490314]  device_unregister+0x20/0x7c
[    1.494220]  __dma_async_device_channel_unregister+0x68/0xc0

Look at dma_async_device_register() function error path, channel device
unregistration is done only if chan-&gt;local is not NULL.

Then add the same condition at the beginning of
__dma_async_device_channel_unregister() function, to avoid NULL pointer
issue whatever the API used to reach this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52493</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Drop chan lock before queuing buffers

Ensure read and write locks for the channel are not taken in succession by
dropping the read lock from parse_xfer_event() such that a callback given
to client can potentially queue buffers and acquire the write lock in that
process. Any queueing of buffers should be done without channel read lock
acquired as it can result in multiple locks and a soft lockup.

[mani: added fixes tag and cc'ed stable]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221274">SUSE bug 1221274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52494</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52494" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Add alignment check for event ring read pointer

Though we do check the event ring read pointer by "is_valid_ring_ptr"
to make sure it is in the buffer range, but there is another risk the
pointer may be not aligned.  Since we are expecting event ring elements
are 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer
could lead to multiple issues like DoS or ring buffer memory corruption.

So add a alignment check for event ring read pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221273">SUSE bug 1221273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52497</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix lz4 inplace decompression

Currently EROFS can map another compressed buffer for inplace
decompression, that was used to handle the cases that some pages of
compressed data are actually not in-place I/O.

However, like most simple LZ77 algorithms, LZ4 expects the compressed
data is arranged at the end of the decompressed buffer and it
explicitly uses memmove() to handle overlapping:
  __________________________________________________________
 |_ direction of decompression --&gt; ____ |_ compressed data _|

Although EROFS arranges compressed data like this, it typically maps two
individual virtual buffers so the relative order is uncertain.
Previously, it was hardly observed since LZ4 only uses memmove() for
short overlapped literals and x86/arm64 memmove implementations seem to
completely cover it up and they don't have this issue.  Juhyung reported
that EROFS data corruption can be found on a new Intel x86 processor.
After some analysis, it seems that recent x86 processors with the new
FSRM feature expose this issue with "rep movsb".

Let's strictly use the decompressed buffer for lz4 inplace
decompression for now.  Later, as an useful improvement, we could try
to tie up these two buffers together in the correct order.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52498</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: sleep: Fix possible deadlocks in core system-wide PM code

It is reported that in low-memory situations the system-wide resume core
code deadlocks, because async_schedule_dev() executes its argument
function synchronously if it cannot allocate memory (and not only in
that case) and that function attempts to acquire a mutex that is already
held.  Executing the argument function synchronously from within
dpm_async_fn() may also be problematic for ordering reasons (it may
cause a consumer device's resume callback to be invoked before a
requisite supplier device's one, for example).

Address this by changing the code in question to use
async_schedule_dev_nocall() for scheduling the asynchronous
execution of device suspend and resume functions and to directly
run them synchronously if async_schedule_dev_nocall() returns false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221269">SUSE bug 1221269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52500</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command

Tags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed
when we receive the response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52501</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52501" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not attempt to read past "commit"

When iterating over the ring buffer while the ring buffer is active, the
writer can corrupt the reader. There's barriers to help detect this and
handle it, but that code missed the case where the last event was at the
very end of the page and has only 4 bytes left.

The checks to detect the corruption by the writer to reads needs to see the
length of the event. If the length in the first 4 bytes is zero then the
length is stored in the second 4 bytes. But if the writer is in the process
of updating that code, there's a small window where the length in the first
4 bytes could be zero even though the length is only 4 bytes. That will
cause rb_event_length() to read the next 4 bytes which could happen to be off the
allocated page.

To protect against this, fail immediately if the next event pointer is
less than 8 bytes from the end of the commit (last byte of data), as all
events must be a minimum of 8 bytes anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52502</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52502" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()

Sili Luo reported a race in nfc_llcp_sock_get(), leading to UAF.

Getting a reference on the socket found in a lookup while
holding a lock should happen before releasing the lock.

nfc_llcp_sock_get_sn() has a similar problem.

Finally nfc_llcp_recv_snl() needs to make sure the socket
found by nfc_llcp_sock_from_sn() does not disappear.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220832">SUSE bug 1220832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52503</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52503" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix use-after-free vulnerability in amdtee_close_session

There is a potential race condition in amdtee_close_session that may
cause use-after-free in amdtee_open_session. For instance, if a session
has refcount == 1, and one thread tries to free this session via:

    kref_put(&amp;sess-&gt;refcount, destroy_session);

the reference count will get decremented, and the next step would be to
call destroy_session(). However, if in another thread,
amdtee_open_session() is called before destroy_session() has completed
execution, alloc_session() may return 'sess' that will be freed up
later in destroy_session() leading to use-after-free in
amdtee_open_session.

To fix this issue, treat decrement of sess-&gt;refcount and removal of
'sess' from session list in destroy_session() as a critical section, so
that it is executed atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220915">SUSE bug 1220915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52504</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52504" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/alternatives: Disable KASAN in apply_alternatives()

Fei has reported that KASAN triggers during apply_alternatives() on
a 5-level paging machine:

	BUG: KASAN: out-of-bounds in rcu_is_watching()
	Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0
	...
	__asan_load4()
	rcu_is_watching()
	trace_hardirqs_on()
	text_poke_early()
	apply_alternatives()
	...

On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57)
gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on
__VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled().

KASAN gets confused when apply_alternatives() patches the
KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START
static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue.

Fix it for real by disabling KASAN while the kernel is patching alternatives.

[ mingo: updated the changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52507" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: assert requested protocol is valid

The protocol is used in a bit mask to determine if the protocol is
supported. Assert the provided protocol is less than the maximum
defined so it doesn't potentially perform a shift-out-of-bounds and
provide a clearer error for undefined protocols vs unsupported ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52508</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52508" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()

The nvme_fc_fcp_op structure describing an AEN operation is initialized with a
null request structure pointer. An FC LLDD may make a call to
nvme_fc_io_getuuid passing a pointer to an nvmefc_fcp_req for an AEN operation.

Add validation of the request structure pointer before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52509</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ravb: Fix use-after-free issue in ravb_tx_timeout_work()

The ravb_stop() should call cancel_work_sync(). Otherwise,
ravb_tx_timeout_work() is possible to use the freed priv after
ravb_remove() was called like below:

CPU0			CPU1
			ravb_tx_timeout()
ravb_remove()
unregister_netdev()
free_netdev(ndev)
// free priv
			ravb_tx_timeout_work()
			// use priv

unregister_netdev() will call .ndo_stop() so that ravb_stop() is
called. And, after phy_stop() is called, netif_carrier_off()
is also called. So that .ndo_tx_timeout() will not be called
after phy_stop().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223290">SUSE bug 1223290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52510</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52510" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ieee802154: ca8210: Fix a potential UAF in ca8210_probe

If of_clk_add_provider() fails in ca8210_register_ext_clock(),
it calls clk_unregister() to release priv-&gt;clk and returns an
error. However, the caller ca8210_probe() then calls ca8210_remove(),
where priv-&gt;clk is freed again in ca8210_unregister_ext_clock(). In
this case, a use-after-free may happen in the second time we call
clk_unregister().

Fix this by removing the first clk_unregister(). Also, priv-&gt;clk could
be an error code on failure of clk_register_fixed_rate(). Use
IS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52511</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52511" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: sun6i: reduce DMA RX transfer width to single byte

Through empirical testing it has been determined that sometimes RX SPI
transfers with DMA enabled return corrupted data. This is down to single
or even multiple bytes lost during DMA transfer from SPI peripheral to
memory. It seems the RX FIFO within the SPI peripheral can become
confused when performing bus read accesses wider than a single byte to it
during an active SPI transfer.

This patch reduces the width of individual DMA read accesses to the
RX FIFO to a single byte to mitigate that issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52513</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix connection failure handling

In case immediate MPA request processing fails, the newly
created endpoint unlinks the listening endpoint and is
ready to be dropped. This special case was not handled
correctly by the code handling the later TCP socket close,
causing a NULL dereference crash in siw_cm_work_handler()
when dereferencing a NULL listener. We now also cancel
the useless MPA timeout, if immediate MPA request
processing fails.

This patch furthermore simplifies MPA processing in general:
Scheduling a useless TCP socket read in sk_data_ready() upcall
is now surpressed, if the socket is already moved out of
TCP_ESTABLISHED state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52515</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Do not call scsi_done() from srp_abort()

After scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler
callback, it performs one of the following actions:
* Call scsi_queue_insert().
* Call scsi_finish_command().
* Call scsi_eh_scmd_add().
Hence, SCSI abort handlers must not call scsi_done(). Otherwise all
the above actions would trigger a use-after-free. Hence remove the
scsi_done() call from srp_abort(). Keep the srp_free_req() call
before returning SUCCESS because we may not see the command again if
SUCCESS is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52517</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain

Previously the transfer complete IRQ immediately drained to RX FIFO to
read any data remaining in FIFO to the RX buffer. This behaviour is
correct when dealing with SPI in interrupt mode. However in DMA mode the
transfer complete interrupt still fires as soon as all bytes to be
transferred have been stored in the FIFO. At that point data in the FIFO
still needs to be picked up by the DMA engine. Thus the drain procedure
and DMA engine end up racing to read from RX FIFO, corrupting any data
read. Additionally the RX buffer pointer is never adjusted according to
DMA progress in DMA mode, thus calling the RX FIFO drain procedure in DMA
mode is a bug.
Fix corruptions in DMA RX mode by draining RX FIFO only in interrupt mode.
Also wait for completion of RX DMA when in DMA mode before returning to
ensure all data has been copied to the supplied memory buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52518</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52518" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_codec: Fix leaking content of local_codecs

The following memory leak can be observed when the controller supports
codecs which are stored in local_codecs list but the elements are never
freed:

unreferenced object 0xffff88800221d840 (size 32):
  comm "kworker/u3:0", pid 36, jiffies 4294898739 (age 127.060s)
  hex dump (first 32 bytes):
    f8 d3 02 03 80 88 ff ff 80 d8 21 02 80 88 ff ff  ..........!.....
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffffb324f557&gt;] __kmalloc+0x47/0x120
    [&lt;ffffffffb39ef37d&gt;] hci_codec_list_add.isra.0+0x2d/0x160
    [&lt;ffffffffb39ef643&gt;] hci_read_codec_capabilities+0x183/0x270
    [&lt;ffffffffb39ef9ab&gt;] hci_read_supported_codecs+0x1bb/0x2d0
    [&lt;ffffffffb39f162e&gt;] hci_read_local_codecs_sync+0x3e/0x60
    [&lt;ffffffffb39ff1b3&gt;] hci_dev_open_sync+0x943/0x11e0
    [&lt;ffffffffb396d55d&gt;] hci_power_on+0x10d/0x3f0
    [&lt;ffffffffb30c99b4&gt;] process_one_work+0x404/0x800
    [&lt;ffffffffb30ca134&gt;] worker_thread+0x374/0x670
    [&lt;ffffffffb30d9108&gt;] kthread+0x188/0x1c0
    [&lt;ffffffffb304db6b&gt;] ret_from_fork+0x2b/0x50
    [&lt;ffffffffb300206a&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221056">SUSE bug 1221056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52519</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit

The EHL (Elkhart Lake) based platforms provide a OOB (Out of band)
service, which allows to wakup device when the system is in S5 (Soft-Off
state). This OOB service can be enabled/disabled from BIOS settings. When
enabled, the ISH device gets PME wake capability. To enable PME wakeup,
driver also needs to enable ACPI GPE bit.

On resume, BIOS will clear the wakeup bit. So driver need to re-enable it
in resume function to keep the next wakeup capability. But this BIOS
clearing of wakeup bit doesn't decrement internal OS GPE reference count,
so this reenabling on every resume will cause reference count to overflow.

So first disable and reenable ACPI GPE bit using acpi_disable_gpe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52520</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52520" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix reference leak

If a duplicate attribute is found using kset_find_obj(), a reference
to that attribute is returned which needs to be disposed accordingly
using kobject_put(). Move the setting name validation into a separate
function to allow for this change without having to duplicate the
cleanup code for this setting.
As a side note, a very similar bug was fixed in
commit 7295a996fdab ("platform/x86: dell-sysman: Fix reference leak"),
so it seems that the bug was copied from that driver.

Compile-tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52523</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52523" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets

With a SOCKMAP/SOCKHASH map and an sk_msg program user can steer messages
sent from one TCP socket (s1) to actually egress from another TCP
socket (s2):

tcp_bpf_sendmsg(s1)		// = sk_prot-&gt;sendmsg
  tcp_bpf_send_verdict(s1)	// __SK_REDIRECT case
    tcp_bpf_sendmsg_redir(s2)
      tcp_bpf_push_locked(s2)
	tcp_bpf_push(s2)
	  tcp_rate_check_app_limited(s2) // expects tcp_sock
	  tcp_sendmsg_locked(s2)	 // ditto

There is a hard-coded assumption in the call-chain, that the egress
socket (s2) is a TCP socket.

However in commit 122e6c79efe1 ("sock_map: Update sock type checks for
UDP") we have enabled redirects to non-TCP sockets. This was done for the
sake of BPF sk_skb programs. There was no indention to support sk_msg
send-to-egress use case.

As a result, attempts to send-to-egress through a non-TCP socket lead to a
crash due to invalid downcast from sock to tcp_sock:

 BUG: kernel NULL pointer dereference, address: 000000000000002f
 ...
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x60/0x70
  ? __die+0x1f/0x70
  ? page_fault_oops+0x80/0x160
  ? do_user_addr_fault+0x2d7/0x800
  ? rcu_is_watching+0x11/0x50
  ? exc_page_fault+0x70/0x1c0
  ? asm_exc_page_fault+0x27/0x30
  ? tcp_tso_segs+0x14/0xa0
  tcp_write_xmit+0x67/0xce0
  __tcp_push_pending_frames+0x32/0xf0
  tcp_push+0x107/0x140
  tcp_sendmsg_locked+0x99f/0xbb0
  tcp_bpf_push+0x19d/0x3a0
  tcp_bpf_sendmsg_redir+0x55/0xd0
  tcp_bpf_send_verdict+0x407/0x550
  tcp_bpf_sendmsg+0x1a1/0x390
  inet_sendmsg+0x6a/0x70
  sock_sendmsg+0x9d/0xc0
  ? sockfd_lookup_light+0x12/0x80
  __sys_sendto+0x10e/0x160
  ? syscall_enter_from_user_mode+0x20/0x60
  ? __this_cpu_preempt_check+0x13/0x20
  ? lockdep_hardirqs_on+0x82/0x110
  __x64_sys_sendto+0x1f/0x30
  do_syscall_64+0x38/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Reject selecting a non-TCP sockets as redirect target from a BPF sk_msg
program to prevent the crash. When attempted, user will receive an EACCES
error from send/sendto/sendmsg() syscall.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52524</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: llcp: Add lock when modifying device list

The device list needs its associated lock held when modifying it, or the
list could become corrupted, as syzbot discovered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52525</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52525" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet

Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52528</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg

syzbot reported the following uninit-value access issue:

=====================================================
BUG: KMSAN: uninit-value in smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]
BUG: KMSAN: uninit-value in smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482
CPU: 0 PID: 8696 Comm: kworker/0:3 Not tainted 5.8.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: usb_hub_wq hub_event
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x21c/0x280 lib/dump_stack.c:118
 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:121
 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]
 smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482
 usbnet_probe+0x1152/0x3f90 drivers/net/usb/usbnet.c:1737
 usb_probe_interface+0xece/0x1550 drivers/usb/core/driver.c:374
 really_probe+0xf20/0x20b0 drivers/base/dd.c:529
 driver_probe_device+0x293/0x390 drivers/base/dd.c:701
 __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807
 bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431
 __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873
 device_initial_probe+0x4a/0x60 drivers/base/dd.c:920
 bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491
 device_add+0x3b0e/0x40d0 drivers/base/core.c:2680
 usb_set_configuration+0x380f/0x3f10 drivers/usb/core/message.c:2032
 usb_generic_driver_probe+0x138/0x300 drivers/usb/core/generic.c:241
 usb_probe_device+0x311/0x490 drivers/usb/core/driver.c:272
 really_probe+0xf20/0x20b0 drivers/base/dd.c:529
 driver_probe_device+0x293/0x390 drivers/base/dd.c:701
 __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807
 bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431
 __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873
 device_initial_probe+0x4a/0x60 drivers/base/dd.c:920
 bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491
 device_add+0x3b0e/0x40d0 drivers/base/core.c:2680
 usb_new_device+0x1bd4/0x2a30 drivers/usb/core/hub.c:2554
 hub_port_connect drivers/usb/core/hub.c:5208 [inline]
 hub_port_connect_change drivers/usb/core/hub.c:5348 [inline]
 port_event drivers/usb/core/hub.c:5494 [inline]
 hub_event+0x5e7b/0x8a70 drivers/usb/core/hub.c:5576
 process_one_work+0x1688/0x2140 kernel/workqueue.c:2269
 worker_thread+0x10bc/0x2730 kernel/workqueue.c:2415
 kthread+0x551/0x590 kernel/kthread.c:292
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293

Local variable ----buf.i87@smsc75xx_bind created at:
 __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]
 smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482
 __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]
 smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482

This issue is caused because usbnet_read_cmd() reads less bytes than requested
(zero byte in the reproducer). In this case, 'buf' is not properly filled.

This patch fixes the issue by returning -ENODATA if usbnet_read_cmd() reads
less bytes than requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52529</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52529" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: sony: Fix a potential memory leak in sony_probe()

If an error occurs after a successful usb_alloc_urb() call, usb_free_urb()
should be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52530</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix potential key use-after-free

When ieee80211_key_link() is called by ieee80211_gtk_rekey_add()
but returns 0 due to KRACK protection (identical key reinstall),
ieee80211_gtk_rekey_add() will still return a pointer into the
key, in a potential use-after-free. This normally doesn't happen
since it's only called by iwlwifi in case of WoWLAN rekey offload
which has its own KRACK protection, but still better to fix, do
that by returning an error code and converting that to success on
the cfg80211 boundary only, leaving the error for bad callers of
ieee80211_gtk_rekey_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix a memory corruption issue

A few lines above, space is kzalloc()'ed for:
	sizeof(struct iwl_nvm_data) +
	sizeof(struct ieee80211_channel) +
	sizeof(struct ieee80211_rate)

'mvm-&gt;nvm_data' is a 'struct iwl_nvm_data', so it is fine.

At the end of this structure, there is the 'channels' flex array.
Each element is of type 'struct ieee80211_channel'.
So only 1 element is allocated in this array.

When doing:
  mvm-&gt;nvm_data-&gt;bands[0].channels = mvm-&gt;nvm_data-&gt;channels;
We point at the first element of the 'channels' flex array.
So this is fine.

However, when doing:
  mvm-&gt;nvm_data-&gt;bands[0].bitrates =
			(void *)((u8 *)mvm-&gt;nvm_data-&gt;channels + 1);
because of the "(u8 *)" cast, we add only 1 to the address of the beginning
of the flex array.

It is likely that we want point at the 'struct ieee80211_rate' allocated
just after.

Remove the spurious casting so that the pointer arithmetic works as
expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52532</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52532" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix TX CQE error handling

For an unknown TX CQE error type (probably from a newer hardware),
still free the SKB, update the queue tail, etc., otherwise the
accounting will be wrong.

Also, TX errors can be triggered by injecting corrupted packets, so
replace the WARN_ONCE to ratelimited error logging.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Avoid memory allocation in iommu_suspend()

The iommu_suspend() syscore suspend callback is invoked with IRQ disabled.
Allocating memory with the GFP_KERNEL flag may re-enable IRQs during
the suspend callback, which can cause intermittent suspend/hibernation
problems with the following kernel traces:

Calling iommu_suspend+0x0/0x1d0
------------[ cut here ]------------
WARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0
...
CPU: 0 PID: 15 Comm: rcu_preempt Tainted: G     U      E      6.3-intel #r1
RIP: 0010:ktime_get+0x9b/0xb0
...
Call Trace:
 &lt;IRQ&gt;
 tick_sched_timer+0x22/0x90
 ? __pfx_tick_sched_timer+0x10/0x10
 __hrtimer_run_queues+0x111/0x2b0
 hrtimer_interrupt+0xfa/0x230
 __sysvec_apic_timer_interrupt+0x63/0x140
 sysvec_apic_timer_interrupt+0x7b/0xa0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1f/0x30
...
------------[ cut here ]------------
Interrupts enabled after iommu_suspend+0x0/0x1d0
WARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270
CPU: 0 PID: 27420 Comm: rtcwake Tainted: G     U  W   E      6.3-intel #r1
RIP: 0010:syscore_suspend+0x147/0x270
...
Call Trace:
 &lt;TASK&gt;
 hibernation_snapshot+0x25b/0x670
 hibernate+0xcd/0x390
 state_store+0xcf/0xe0
 kobj_attr_store+0x13/0x30
 sysfs_kf_write+0x3f/0x50
 kernfs_fop_write_iter+0x128/0x200
 vfs_write+0x1fd/0x3c0
 ksys_write+0x6f/0xf0
 __x64_sys_write+0x1d/0x30
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

Given that only 4 words memory is needed, avoid the memory allocation in
iommu_suspend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52561</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52561" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved

Adding a reserved memory region for the framebuffer memory
(the splash memory region set up by the bootloader).

It fixes a kernel panic (arm-smmu: Unhandled context fault
at this particular memory region) reported on DB845c running
v5.10.y.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220935">SUSE bug 1220935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52563</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52563" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/meson: fix memory leak on -&gt;hpd_notify callback

The EDID returned by drm_bridge_get_edid() needs to be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220937">SUSE bug 1220937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52564" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"

This reverts commit 9b9c8195f3f0d74a826077fc1c01b9ee74907239.

The commit above is reverted as it did not solve the original issue.

gsm_cleanup_mux() tries to free up the virtual ttys by calling
gsm_dlci_release() for each available DLCI. There, dlci_put() is called to
decrease the reference counter for the DLCI via tty_port_put() which
finally calls gsm_dlci_free(). This already clears the pointer which is
being checked in gsm_cleanup_mux() before calling gsm_dlci_release().
Therefore, it is not necessary to clear this pointer in gsm_cleanup_mux()
as done in the reverted commit. The commit introduces a null pointer
dereference:
 &lt;TASK&gt;
 ? __die+0x1f/0x70
 ? page_fault_oops+0x156/0x420
 ? search_exception_tables+0x37/0x50
 ? fixup_exception+0x21/0x310
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? tty_port_put+0x19/0xa0
 gsmtty_cleanup+0x29/0x80 [n_gsm]
 release_one_tty+0x37/0xe0
 process_one_work+0x1e6/0x3e0
 worker_thread+0x4c/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe1/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2f/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

The actual issue is that nothing guards dlci_put() from being called
multiple times while the tty driver was triggered but did not yet finished
calling gsm_dlci_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52566</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52566" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()

In nilfs_gccache_submit_read_data(), brelse(bh) is called to drop the
reference count of bh when the call to nilfs_dat_translate() fails.  If
the reference count hits 0 and its owner page gets unlocked, bh may be
freed.  However, bh-&gt;b_page is dereferenced to put the page after that,
which may result in a use-after-free bug.  This patch moves the release
operation after unlocking and putting the page.

NOTE: The function in question is only called in GC, and in combination
with current userland tools, address translation using DAT does not occur
in that function, so the code path that causes this issue will not be
executed.  However, it is possible to run that code path by intentionally
modifying the userland GC library or by calling the GC ioctl directly.

[konishi.ryusuke@gmail.com: NOTE added to the commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250_port: Check IRQ data before use

In case the leaf driver wants to use IRQ polling (irq = 0) and
IIR register shows that an interrupt happened in the 8250 hardware
the IRQ data can be NULL. In such a case we need to skip the wake
event as we came to this path from the timer interrupt and quite
likely system is already awake.

Without this fix we have got an Oops:

    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A
    ...
    BUG: kernel NULL pointer dereference, address: 0000000000000010
    RIP: 0010:serial8250_handle_irq+0x7c/0x240
    Call Trace:
     ? serial8250_handle_irq+0x7c/0x240
     ? __pfx_serial8250_timeout+0x10/0x10
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52569</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: remove BUG() after failure to insert delayed dir index item

Instead of calling BUG() when we fail to insert a delayed dir index item
into the delayed node's tree, we can just release all the resources we
have allocated/acquired before and return the error to the caller. This is
fine because all existing call chains undo anything they have done before
calling btrfs_insert_delayed_dir_index() or BUG_ON (when creating pending
snapshots in the transaction commit path).

So remove the BUG() call and do proper error handling.

This relates to a syzbot report linked below, but does not fix it because
it only prevents hitting a BUG(), it does not fix the issue where somehow
we attempt to use twice the same index number for different index items.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52573</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52573" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rds: Fix possible NULL-pointer dereference

In rds_rdma_cm_event_handler_cmn() check, if conn pointer exists
before dereferencing it as rdma_set_service_type() argument

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220869">SUSE bug 1220869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52574</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: fix null-ptr-deref when team device type is changed

Get a null-ptr-deref bug as follows with reproducer [1].

BUG: kernel NULL pointer dereference, address: 0000000000000228
...
RIP: 0010:vlan_dev_hard_header+0x35/0x140 [8021q]
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x24/0x70
 ? page_fault_oops+0x82/0x150
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? vlan_dev_hard_header+0x35/0x140 [8021q]
 ? vlan_dev_hard_header+0x8e/0x140 [8021q]
 neigh_connected_output+0xb2/0x100
 ip6_finish_output2+0x1cb/0x520
 ? nf_hook_slow+0x43/0xc0
 ? ip6_mtu+0x46/0x80
 ip6_finish_output+0x2a/0xb0
 mld_sendpack+0x18f/0x250
 mld_ifc_work+0x39/0x160
 process_one_work+0x1e6/0x3f0
 worker_thread+0x4d/0x2f0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe5/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30

[1]
$ teamd -t team0 -d -c '{"runner": {"name": "loadbalance"}}'
$ ip link add name t-dummy type dummy
$ ip link add link t-dummy name t-dummy.100 type vlan id 100
$ ip link add name t-nlmon type nlmon
$ ip link set t-nlmon master team0
$ ip link set t-nlmon nomaster
$ ip link set t-dummy up
$ ip link set team0 up
$ ip link set t-dummy.100 down
$ ip link set t-dummy.100 master team0

When enslave a vlan device to team device and team device type is changed
from non-ether to ether, header_ops of team device is changed to
vlan_header_ops. That is incorrect and will trigger null-ptr-deref
for vlan-&gt;real_dev in vlan_dev_hard_header() because team device is not
a vlan device.

Cache eth_header_ops in team_setup(), then assign cached header_ops to
header_ops of team net device when its type is changed from non-ether
to ether to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52575</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52576</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()

The code calling ima_free_kexec_buffer() runs long after the memblock
allocator has already been torn down, potentially resulting in a use
after free in memblock_isolate_range().

With KASAN or KFENCE, this use after free will result in a BUG
from the idle task, and a subsequent kernel panic.

Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid
that bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52580</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/core: Fix ETH_P_1588 flow dissector

When a PTP ethernet raw frame with a size of more than 256 bytes followed
by a 0xff pattern is sent to __skb_flow_dissect, nhoff value calculation
is wrong. For example: hdr-&gt;message_length takes the wrong value (0xffff)
and it does not replicate real header length. In this case, 'nhoff' value
was overridden and the PTP header was badly dissected. This leads to a
kernel crash.

net/core: flow_dissector
net/core flow dissector nhoff = 0x0000000e
net/core flow dissector hdr-&gt;message_length = 0x0000ffff
net/core flow dissector nhoff = 0x0001000d (u16 overflow)
...
skb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88
skb frag:     00000000: f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Using the size of the ptp_header struct will allow the corrected
calculation of the nhoff value.

net/core flow dissector nhoff = 0x0000000e
net/core flow dissector nhoff = 0x00000030 (sizeof ptp_header)
...
skb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 f7 ff ff
skb linear:   00000010: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
skb linear:   00000020: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
skb frag:     00000000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Kernel trace:
[   74.984279] ------------[ cut here ]------------
[   74.989471] kernel BUG at include/linux/skbuff.h:2440!
[   74.995237] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[   75.001098] CPU: 4 PID: 0 Comm: swapper/4 Tainted: G     U            5.15.85-intel-ese-standard-lts #1
[   75.011629] Hardware name: Intel Corporation A-Island (CPU:AlderLake)/A-Island (ID:06), BIOS SB_ADLP.01.01.00.01.03.008.D-6A9D9E73-dirty Mar 30 2023
[   75.026507] RIP: 0010:eth_type_trans+0xd0/0x130
[   75.031594] Code: 03 88 47 78 eb c7 8b 47 68 2b 47 6c 48 8b 97 c0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb ab &lt;0f&gt; 0b b8 00 01 00 00 eb a2 48 85 ff 74 eb 48 8d 54 24 06 31 f6 b9
[   75.052612] RSP: 0018:ffff9948c0228de0 EFLAGS: 00010297
[   75.058473] RAX: 00000000000003f2 RBX: ffff8e47047dc300 RCX: 0000000000001003
[   75.066462] RDX: ffff8e4e8c9ea040 RSI: ffff8e4704e0a000 RDI: ffff8e47047dc300
[   75.074458] RBP: ffff8e4704e2acc0 R08: 00000000000003f3 R09: 0000000000000800
[   75.082466] R10: 000000000000000d R11: ffff9948c0228dec R12: ffff8e4715e4e010
[   75.090461] R13: ffff9948c0545018 R14: 0000000000000001 R15: 0000000000000800
[   75.098464] FS:  0000000000000000(0000) GS:ffff8e4e8fb00000(0000) knlGS:0000000000000000
[   75.107530] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   75.113982] CR2: 00007f5eb35934a0 CR3: 0000000150e0a002 CR4: 0000000000770ee0
[   75.121980] PKRU: 55555554
[   75.125035] Call Trace:
[   75.127792]  &lt;IRQ&gt;
[   75.130063]  ? eth_get_headlen+0xa4/0xc0
[   75.134472]  igc_process_skb_fields+0xcd/0x150
[   75.139461]  igc_poll+0xc80/0x17b0
[   75.143272]  __napi_poll+0x27/0x170
[   75.147192]  net_rx_action+0x234/0x280
[   75.151409]  __do_softirq+0xef/0x2f4
[   75.155424]  irq_exit_rcu+0xc7/0x110
[   75.159432]  common_interrupt+0xb8/0xd0
[   75.163748]  &lt;/IRQ&gt;
[   75.166112]  &lt;TASK&gt;
[   75.168473]  asm_common_interrupt+0x22/0x40
[   75.173175] RIP: 0010:cpuidle_enter_state+0xe2/0x350
[   75.178749] Code: 85 c0 0f 8f 04 02 00 00 31 ff e8 39 6c 67 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 50 02 00 00 31 ff e8 52 b0 6d ff fb 45 85 f6 &lt;0f&gt; 88 b1 00 00 00 49 63 ce 4c 2b 2c 24 48 89 c8 48 6b d1 68 48 c1
[   75.199757] RSP: 0018:ffff9948c013bea8 EFLAGS: 00000202
[   75.205614] RAX: ffff8e4e8fb00000 RBX: ffffb948bfd23900 RCX: 000000000000001f
[   75.213619] RDX: 0000000000000004 RSI: ffffffff94206161 RDI: ffffffff94212e20
[   75.221620] RBP: 0000000000000004 R08: 000000117568973a R09: 0000000000000001
[   75.229622] R10: 000000000000afc8 R11: ffff8e4e8fb29ce4 R12: ffffffff945ae980
[   75.237628] R13: 000000117568973a R14: 0000000000000004 R15: 0000000000000000
[   75.245635]  ? 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220876">SUSE bug 1220876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52581</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix memleak when more than 255 elements expired

When more than 255 elements expired we're supposed to switch to a new gc
container structure.

This never happens: u8 type will wrap before reaching the boundary
and nft_trans_gc_space() always returns true.

This means we recycle the initial gc container structure and
lose track of the elements that came before.

While at it, don't deref 'gc' after we've passed it to call_rcu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220877">SUSE bug 1220877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Only call folio_start_fscache() one time for each folio

If a network filesystem using netfs implements a clamp_length()
function, it can set subrequest lengths smaller than a page size.

When we loop through the folios in netfs_rreq_unlock_folios() to
set any folios to be written back, we need to make sure we only
call folio_start_fscache() once for each folio.

Otherwise, this simple testcase:

  mount -o fsc,rsize=1024,wsize=1024 127.0.0.1:/export /mnt/nfs
  dd if=/dev/zero of=/mnt/nfs/file.bin bs=4096 count=1
  1+0 records in
  1+0 records out
  4096 bytes (4.1 kB, 4.0 KiB) copied, 0.0126359 s, 324 kB/s
  echo 3 &gt; /proc/sys/vm/drop_caches
  cat /mnt/nfs/file.bin &gt; /dev/null

will trigger an oops similar to the following:

  page dumped because: VM_BUG_ON_FOLIO(folio_test_private_2(folio))
  ------------[ cut here ]------------
  kernel BUG at include/linux/netfs.h:44!
  ...
  CPU: 5 PID: 134 Comm: kworker/u16:5 Kdump: loaded Not tainted 6.4.0-rc5
  ...
  RIP: 0010:netfs_rreq_unlock_folios+0x68e/0x730 [netfs]
  ...
  Call Trace:
    netfs_rreq_assess+0x497/0x660 [netfs]
    netfs_subreq_terminated+0x32b/0x610 [netfs]
    nfs_netfs_read_completion+0x14e/0x1a0 [nfs]
    nfs_read_completion+0x2f9/0x330 [nfs]
    rpc_free_task+0x72/0xa0 [sunrpc]
    rpc_async_release+0x46/0x70 [sunrpc]
    process_one_work+0x3bd/0x710
    worker_thread+0x89/0x610
    kthread+0x181/0x1c0
    ret_from_fork+0x29/0x50
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix deadlock or deadcode of misusing dget()

The lock order is incorrect between denty and its parent, we should
always make sure that the parent get the lock first.

But since this deadcode is never used and the parent dir will always
be set from the callers, let's just remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52585</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()

Return invalid error code -EINVAL for invalid block id.

Fixes the below:

drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221080">SUSE bug 1221080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52586" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add mutex lock in control vblank irq

Add a mutex lock to control vblank irq to synchronize vblank
enable/disable operations happening from different threads to prevent
race conditions while registering/unregistering the vblank irq callback.

v4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a
    parameter of dpu_encoder_phys.
    -Switch from atomic refcnt to a simple int counter as mutex has
    now been added
v3: Mistakenly did not change wording in last version. It is done now.
v2: Slightly changed wording of commit message

Patchwork: https://patchwork.freedesktop.org/patch/571854/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221081">SUSE bug 1221081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52587</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/ipoib: Fix mcast list locking

Releasing the `priv-&gt;lock` while iterating the `priv-&gt;multicast_list` in
`ipoib_mcast_join_task()` opens a window for `ipoib_mcast_dev_flush()` to
remove the items while in the middle of iteration. If the mcast is removed
while the lock was dropped, the for loop spins forever resulting in a hard
lockup (as was reported on RHEL 4.18.0-372.75.1.el8_6 kernel):

    Task A (kworker/u72:2 below)       | Task B (kworker/u72:0 below)
    -----------------------------------+-----------------------------------
    ipoib_mcast_join_task(work)        | ipoib_ib_dev_flush_light(work)
      spin_lock_irq(&amp;priv-&gt;lock)       | __ipoib_ib_dev_flush(priv, ...)
      list_for_each_entry(mcast,       | ipoib_mcast_dev_flush(dev = priv-&gt;dev)
          &amp;priv-&gt;multicast_list, list) |
        ipoib_mcast_join(dev, mcast)   |
          spin_unlock_irq(&amp;priv-&gt;lock) |
                                       |   spin_lock_irqsave(&amp;priv-&gt;lock, flags)
                                       |   list_for_each_entry_safe(mcast, tmcast,
                                       |                  &amp;priv-&gt;multicast_list, list)
                                       |     list_del(&amp;mcast-&gt;list);
                                       |     list_add_tail(&amp;mcast-&gt;list, &amp;remove_list)
                                       |   spin_unlock_irqrestore(&amp;priv-&gt;lock, flags)
          spin_lock_irq(&amp;priv-&gt;lock)   |
                                       |   ipoib_mcast_remove_list(&amp;remove_list)
   (Here, `mcast` is no longer on the  |     list_for_each_entry_safe(mcast, tmcast,
    `priv-&gt;multicast_list` and we keep |                            remove_list, list)
    spinning on the `remove_list` of   |  &gt;&gt;&gt;  wait_for_completion(&amp;mcast-&gt;done)
    the other thread which is blocked  |
    and the list is still valid on     |
    it's stack.)

Fix this by keeping the lock held and changing to GFP_ATOMIC to prevent
eventual sleeps.
Unfortunately we could not reproduce the lockup and confirm this fix but
based on the code review I think this fix should address such lockups.

crash&gt; bc 31
PID: 747      TASK: ff1c6a1a007e8000  CPU: 31   COMMAND: "kworker/u72:2"
--
    [exception RIP: ipoib_mcast_join_task+0x1b1]
    RIP: ffffffffc0944ac1  RSP: ff646f199a8c7e00  RFLAGS: 00000002
    RAX: 0000000000000000  RBX: ff1c6a1a04dc82f8  RCX: 0000000000000000
                                  work (&amp;priv-&gt;mcast_task{,.work})
    RDX: ff1c6a192d60ac68  RSI: 0000000000000286  RDI: ff1c6a1a04dc8000
           &amp;mcast-&gt;list
    RBP: ff646f199a8c7e90   R8: ff1c699980019420   R9: ff1c6a1920c9a000
    R10: ff646f199a8c7e00  R11: ff1c6a191a7d9800  R12: ff1c6a192d60ac00
                                                         mcast
    R13: ff1c6a1d82200000  R14: ff1c6a1a04dc8000  R15: ff1c6a1a04dc82d8
           dev                    priv (&amp;priv-&gt;lock)     &amp;priv-&gt;multicast_list (aka head)
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
--- &lt;NMI exception stack&gt; ---
 #5 [ff646f199a8c7e00] ipoib_mcast_join_task+0x1b1 at ffffffffc0944ac1 [ib_ipoib]
 #6 [ff646f199a8c7e98] process_one_work+0x1a7 at ffffffff9bf10967

crash&gt; rx ff646f199a8c7e68
ff646f199a8c7e68:  ff1c6a1a04dc82f8 &lt;&lt;&lt; work = &amp;priv-&gt;mcast_task.work

crash&gt; list -hO ipoib_dev_priv.multicast_list ff1c6a1a04dc8000
(empty)

crash&gt; ipoib_dev_priv.mcast_task.work.func,mcast_mutex.owner.counter ff1c6a1a04dc8000
  mcast_task.work.func = 0xffffffffc0944910 &lt;ipoib_mcast_join_task&gt;,
  mcast_mutex.owner.counter = 0xff1c69998efec000

crash&gt; b 8
PID: 8        TASK: ff1c69998efec000  CPU: 33   COMMAND: "kworker/u72:0"
--
 #3 [ff646f1980153d50] wait_for_completion+0x96 at ffffffff9c7d7646
 #4 [ff646f1980153d90] ipoib_mcast_remove_list+0x56 at ffffffffc0944dc6 [ib_ipoib]
 #5 [ff646f1980153de8] ipoib_mcast_dev_flush+0x1a7 at ffffffffc09455a7 [ib_ipoib]
 #6 [ff646f1980153e58] __ipoib_ib_dev_flush+0x1a4 at ffffffffc09431a4 [ib_ipoib]
 #7 [ff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221082">SUSE bug 1221082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52589</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52589" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rkisp1: Fix IRQ disable race issue

In rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the
interrupts and then apparently assumes that the interrupt handler won't
be running, and proceeds in the stop procedure. This is not the case, as
the interrupt handler can already be running, which would lead to the
ISP being disabled while the interrupt handler handling a captured
frame.

This brings up two issues: 1) the ISP could be powered off while the
interrupt handler is still running and accessing registers, leading to
board lockup, and 2) the interrupt handler code and the code that
disables the streaming might do things that conflict.

It is not clear to me if 2) causes a real issue, but 1) can be seen with
a suitable delay (or printk in my case) in the interrupt handler,
leading to board lockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221084">SUSE bug 1221084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52590</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change ocfs2 rename code to avoid touching renamed directory if
its parent does not change as without locking that can corrupt the
filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

reiserfs: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change reiserfs rename code to avoid touching renamed directory
if its parent does not change as without locking that can corrupt the
filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()

Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()'
should check the return value before examining skb data. So convert
the latter to return an appropriate error code and propagate it to
return from 'wfx_start_ap()' as well. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221042">SUSE bug 1221042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52594</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()

Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug
occurs when txs-&gt;cnt, data from a URB provided by a USB device, is
bigger than the size of the array txs-&gt;txstatus, which is
HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug
handling code after the check. Make the function return if that is the
case.

Found by a modified version of syzkaller.

UBSAN: array-index-out-of-bounds in htc_drv_txrx.c
index 13 is out of range for type '__wmi_event_txstatus [12]'
Call Trace:
 ath9k_htc_txstatus
 ath9k_wmi_event_tasklet
 tasklet_action_common
 __do_softirq
 irq_exit_rxu
 sysvec_apic_timer_interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221045">SUSE bug 1221045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52595</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rt2x00: restart beacon queue when hardware reset

When a hardware reset is triggered, all registers are reset, so all
queues are forced to stop in hardware interface. However, mac80211
will not automatically stop the queue. If we don't manually stop the
beacon queue, the queue will be deadlocked and unable to start again.
This patch fixes the issue where Apple devices cannot connect to the
AP after calling ieee80211_restart_hw().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221046">SUSE bug 1221046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: fix setting of fpc register

kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
(fpc) register of a guest cpu. The new value is tested for validity by
temporarily loading it into the fpc register.

This may lead to corruption of the fpc register of the host process:
if an interrupt happens while the value is temporarily loaded into the fpc
register, and within interrupt context floating point or vector registers
are used, the current fp/vx registers are saved with save_fpu_regs()
assuming they belong to user space and will be loaded into fp/vx registers
when returning to user space.

test_fp_ctl() restores the original user space / host process fpc register
value, however it will be discarded, when returning to user space.

In result the host process will incorrectly continue to run with the value
that was supposed to be used for a guest cpu.

Fix this by simply removing the test. There is another test right before
the SIE context is entered which will handles invalid values.

This results in a change of behaviour: invalid values will now be accepted
instead of that the ioctl fails with -EINVAL. This seems to be acceptable,
given that this interface is most likely not used anymore, and this is in
addition the same behaviour implemented with the memory mapped interface
(replace invalid values with zero) - see sync_regs() in kvm-s390.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/ptrace: handle setting of fpc register correctly

If the content of the floating point control (fpc) register of a traced
process is modified with the ptrace interface the new value is tested for
validity by temporarily loading it into the fpc register.

This may lead to corruption of the fpc register of the tracing process:
if an interrupt happens while the value is temporarily loaded into the
fpc register, and within interrupt context floating point or vector
registers are used, the current fp/vx registers are saved with
save_fpu_regs() assuming they belong to user space and will be loaded into
fp/vx registers when returning to user space.

test_fp_ctl() restores the original user space fpc register value, however
it will be discarded, when returning to user space.

In result the tracer will incorrectly continue to run with the value that
was supposed to be used for the traced process.

Fix this by saving fpu register contents with save_fpu_regs() before using
test_fp_ctl().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221060">SUSE bug 1221060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in diNewExt

[Syz report]
UBSAN: array-index-out-of-bounds in fs/jfs/jfs_imap.c:2360:2
index -878706688 is out of range for type 'struct iagctl[128]'
CPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:217 [inline]
 __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348
 diNewExt+0x3cf3/0x4000 fs/jfs/jfs_imap.c:2360
 diAllocExt fs/jfs/jfs_imap.c:1949 [inline]
 diAllocAG+0xbe8/0x1e50 fs/jfs/jfs_imap.c:1666
 diAlloc+0x1d3/0x1760 fs/jfs/jfs_imap.c:1587
 ialloc+0x8f/0x900 fs/jfs/jfs_inode.c:56
 jfs_mkdir+0x1c5/0xb90 fs/jfs/namei.c:225
 vfs_mkdir+0x2f1/0x4b0 fs/namei.c:4106
 do_mkdirat+0x264/0x3a0 fs/namei.c:4129
 __do_sys_mkdir fs/namei.c:4149 [inline]
 __se_sys_mkdir fs/namei.c:4147 [inline]
 __x64_sys_mkdir+0x6e/0x80 fs/namei.c:4147
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7fcb7e6a0b57
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57
RDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140
RBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000

[Analysis]
When the agstart is too large, it can cause agno overflow.

[Fix]
After obtaining agno, if the value is invalid, exit the subsequent process.


Modified the test from agno &gt; MAXAG to agno &gt;= MAXAG based on linux-next
report by kernel test robot (Dan Carpenter).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221062">SUSE bug 1221062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228782">SUSE bug 1228782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix uaf in jfs_evict_inode

When the execution of diMount(ipimap) fails, the object ipimap that has been
released may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs
when rcu_core() calls jfs_free_node().

Therefore, when diMount(ipimap) fails, sbi-&gt;ipimap should not be initialized as
ipimap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221071">SUSE bug 1221071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228783">SUSE bug 1228783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in dbAdjTree

Currently there is a bound check missing in the dbAdjTree while
accessing the dmt_stree. To add the required check added the bool is_ctl
which is required to determine the size as suggest in the following
commit.
https://lore.kernel.org/linux-kernel-mentees/f9475918-2186-49b8-b801-6f0f9e75f4fa@oracle.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221068">SUSE bug 1221068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228822">SUSE bug 1228822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix slab-out-of-bounds Read in dtSearch

Currently while searching for current page in the sorted entry table
of the page there is a out of bound access. Added a bound check to fix
the error.

Dave:
Set return code to -EIO
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221070">SUSE bug 1221070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

UBSAN: array-index-out-of-bounds in dtSplitRoot

Syzkaller reported the following issue:

oop0: detected capacity change from 0 to 32768

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9
index -2 is out of range for type 'struct dtslot [128]'
CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:151 [inline]
 __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283
 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971
 dtSplitUp fs/jfs/jfs_dtree.c:985 [inline]
 dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863
 jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270
 vfs_mkdir+0x3b3/0x590 fs/namei.c:4013
 do_mkdirat+0x279/0x550 fs/namei.c:4038
 __do_sys_mkdirat fs/namei.c:4053 [inline]
 __se_sys_mkdirat fs/namei.c:4051 [inline]
 __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fcdc0113fd9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9
RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003
RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0
R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000
R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000
 &lt;/TASK&gt;

The issue is caused when the value of fsi becomes less than -1.
The check to break the loop when fsi value becomes -1 is present
but syzbot was able to produce value less than -1 which cause the error.
This patch simply add the change for the values less than 0.

The patch is tested via syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221066">SUSE bug 1221066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52604</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree

Syzkaller reported the following issue:

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6
index 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]')
CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:217 [inline]
 __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348
 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867
 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834
 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331
 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]
 dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402
 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534
 txUpdateMap+0x342/0x9e0
 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
 jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732
 kthread+0x2d3/0x370 kernel/kthread.c:388
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
 &lt;/TASK&gt;
================================================================================
Kernel panic - not syncing: UBSAN: panic_on_warn set ...
CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 panic+0x30f/0x770 kernel/panic.c:340
 check_panic_on_warn+0x82/0xa0 kernel/panic.c:236
 ubsan_epilogue lib/ubsan.c:223 [inline]
 __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348
 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867
 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834
 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331
 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]
 dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402
 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534
 txUpdateMap+0x342/0x9e0
 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
 jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732
 kthread+0x2d3/0x370 kernel/kthread.c:388
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
 &lt;/TASK&gt;
Kernel Offset: disabled
Rebooting in 86400 seconds..

The issue is caused when the value of lp becomes greater than
CTLTREESIZE which is the max size of stree. Adding a simple check
solves this issue.

Dave:
As the function returns a void, good error handling
would require a more intrusive code reorganization, so I modified
Osama's patch at use WARN_ON_ONCE for lack of a cleaner option.

The patch is tested via syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221067">SUSE bug 1221067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228739">SUSE bug 1228739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52605</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52606</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/lib: Validate size for vector operations

Some of the fp/vmx code in sstep.c assume a certain maximum size for the
instructions being emulated. The size of those operations however is
determined separately in analyse_instr().

Add a check to validate the assumption on the maximum size of the
operations, so as to prevent any unintended kernel stack corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221069">SUSE bug 1221069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/mm: Fix null-pointer dereference in pgtable_cache_add

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52608</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52608" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Check mailbox/SMT channel for consistency

On reception of a completion interrupt the shared memory area is accessed
to retrieve the message header at first and then, if the message sequence
number identifies a transaction which is still pending, the related
payload is fetched too.

When an SCMI command times out the channel ownership remains with the
platform until eventually a late reply is received and, as a consequence,
any further transmission attempt remains pending, waiting for the channel
to be relinquished by the platform.

Once that late reply is received the channel ownership is given back
to the agent and any pending request is then allowed to proceed and
overwrite the SMT area of the just delivered late reply; then the wait
for the reply to the new request starts.

It has been observed that the spurious IRQ related to the late reply can
be wrongly associated with the freshly enqueued request: when that happens
the SCMI stack in-flight lookup procedure is fooled by the fact that the
message header now present in the SMT area is related to the new pending
transaction, even though the real reply has still to arrive.

This race-condition on the A2P channel can be detected by looking at the
channel status bits: a genuine reply from the platform will have set the
channel free bit before triggering the completion IRQ.

Add a consistency check to validate such condition in the A2P ISR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221375">SUSE bug 1221375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ct: fix skb leak and crash on ooo frags

act_ct adds skb-&gt;users before defragmentation. If frags arrive in order,
the last frag's reference is reset in:

  inet_frag_reasm_prepare
    skb_morph

which is not straightforward.

However when frags arrive out of order, nobody unref the last frag, and
all frags are leaked. The situation is even worse, as initiating packet
capture can lead to a crash[0] when skb has been cloned and shared at the
same time.

Fix the issue by removing skb_get() before defragmentation. act_ct
returns TC_ACT_CONSUMED when defrag failed or in progress.

[0]:
[  843.804823] ------------[ cut here ]------------
[  843.809659] kernel BUG at net/core/skbuff.c:2091!
[  843.814516] invalid opcode: 0000 [#1] PREEMPT SMP
[  843.819296] CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G S 6.7.0-rc3 #2
[  843.824107] Hardware name: XFUSION 1288H V6/BC13MBSBD, BIOS 1.29 11/25/2022
[  843.828953] RIP: 0010:pskb_expand_head+0x2ac/0x300
[  843.833805] Code: 8b 70 28 48 85 f6 74 82 48 83 c6 08 bf 01 00 00 00 e8 38 bd ff ff 8b 83 c0 00 00 00 48 03 83 c8 00 00 00 e9 62 ff ff ff 0f 0b &lt;0f&gt; 0b e8 8d d0 ff ff e9 b3 fd ff ff 81 7c 24 14 40 01 00 00 4c 89
[  843.843698] RSP: 0018:ffffc9000cce07c0 EFLAGS: 00010202
[  843.848524] RAX: 0000000000000002 RBX: ffff88811a211d00 RCX: 0000000000000820
[  843.853299] RDX: 0000000000000640 RSI: 0000000000000000 RDI: ffff88811a211d00
[  843.857974] RBP: ffff888127d39518 R08: 00000000bee97314 R09: 0000000000000000
[  843.862584] R10: 0000000000000000 R11: ffff8881109f0000 R12: 0000000000000880
[  843.867147] R13: ffff888127d39580 R14: 0000000000000640 R15: ffff888170f7b900
[  843.871680] FS:  0000000000000000(0000) GS:ffff889ffffc0000(0000) knlGS:0000000000000000
[  843.876242] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  843.880778] CR2: 00007fa42affcfb8 CR3: 000000011433a002 CR4: 0000000000770ef0
[  843.885336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  843.889809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  843.894229] PKRU: 55555554
[  843.898539] Call Trace:
[  843.902772]  &lt;IRQ&gt;
[  843.906922]  ? __die_body+0x1e/0x60
[  843.911032]  ? die+0x3c/0x60
[  843.915037]  ? do_trap+0xe2/0x110
[  843.918911]  ? pskb_expand_head+0x2ac/0x300
[  843.922687]  ? do_error_trap+0x65/0x80
[  843.926342]  ? pskb_expand_head+0x2ac/0x300
[  843.929905]  ? exc_invalid_op+0x50/0x60
[  843.933398]  ? pskb_expand_head+0x2ac/0x300
[  843.936835]  ? asm_exc_invalid_op+0x1a/0x20
[  843.940226]  ? pskb_expand_head+0x2ac/0x300
[  843.943580]  inet_frag_reasm_prepare+0xd1/0x240
[  843.946904]  ip_defrag+0x5d4/0x870
[  843.950132]  nf_ct_handle_fragments+0xec/0x130 [nf_conntrack]
[  843.953334]  tcf_ct_act+0x252/0xd90 [act_ct]
[  843.956473]  ? tcf_mirred_act+0x516/0x5a0 [act_mirred]
[  843.959657]  tcf_action_exec+0xa1/0x160
[  843.962823]  fl_classify+0x1db/0x1f0 [cls_flower]
[  843.966010]  ? skb_clone+0x53/0xc0
[  843.969173]  tcf_classify+0x24d/0x420
[  843.972333]  tc_run+0x8f/0xf0
[  843.975465]  __netif_receive_skb_core+0x67a/0x1080
[  843.978634]  ? dev_gro_receive+0x249/0x730
[  843.981759]  __netif_receive_skb_list_core+0x12d/0x260
[  843.984869]  netif_receive_skb_list_internal+0x1cb/0x2f0
[  843.987957]  ? mlx5e_handle_rx_cqe_mpwrq_rep+0xfa/0x1a0 [mlx5_core]
[  843.991170]  napi_complete_done+0x72/0x1a0
[  843.994305]  mlx5e_napi_poll+0x28c/0x6d0 [mlx5_core]
[  843.997501]  __napi_poll+0x25/0x1b0
[  844.000627]  net_rx_action+0x256/0x330
[  844.003705]  __do_softirq+0xb3/0x29b
[  844.006718]  irq_exit_rcu+0x9e/0xc0
[  844.009672]  common_interrupt+0x86/0xa0
[  844.012537]  &lt;/IRQ&gt;
[  844.015285]  &lt;TASK&gt;
[  844.017937]  asm_common_interrupt+0x26/0x40
[  844.020591] RIP: 0010:acpi_safe_halt+0x1b/0x20
[  844.023247] Code: ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 65 48 8b 04 25 00 18 03 00 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 81 d0 44 00 fb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221610">SUSE bug 1221610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52612</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: scomp - fix req-&gt;dst buffer overflow

The req-&gt;dst buffer size should be checked before copying from the
scomp_scratch-&gt;dst to avoid req-&gt;dst buffer overflow problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221616">SUSE bug 1221616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52614</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Fix buffer overflow in trans_stat_show

Fix buffer overflow in trans_stat_show().

Convert simple snprintf to the more secure scnprintf with size of
PAGE_SIZE.

Add condition checking if we are exceeding PAGE_SIZE and exit early from
loop. Also add at the end a warning that we exceeded PAGE_SIZE and that
stats is disabled.

Return -EFBIG in the case where we don't have enough space to write the
full transition table.

Also document in the ABI that this function can return -EFBIG error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221617">SUSE bug 1221617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwrng: core - Fix page fault dead lock on mmap-ed hwrng

There is a dead-lock in the hwrng device read path.  This triggers
when the user reads from /dev/hwrng into memory also mmap-ed from
/dev/hwrng.  The resulting page fault triggers a recursive read
which then dead-locks.

Fix this by using a stack buffer when calling copy_to_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221614">SUSE bug 1221614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52616</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init

When the mpi_ec_ctx structure is initialized, some fields are not
cleared, causing a crash when referencing the field when the
structure was released. Initially, this issue was ignored because
memory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.
For example, this error will be triggered when calculating the
Za value for SM2 separately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52617</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: switchtec: Fix stdev_release() crash after surprise hot remove

A PCI device hot removal may occur while stdev-&gt;cdev is held open. The call
to stdev_release() then happens during close or exit, at a point way past
switchtec_pci_remove(). Otherwise the last ref would vanish with the
trailing put_device(), just before return.

At that later point in time, the devm cleanup has already removed the
stdev-&gt;mmio_mrpc mapping. Also, the stdev-&gt;pdev reference was not a counted
one. Therefore, in DMA mode, the iowrite32() in stdev_release() will cause
a fatal page fault, and the subsequent dma_free_coherent(), if reached,
would pass a stale &amp;stdev-&gt;pdev-&gt;dev pointer.

Fix by moving MRPC DMA shutdown into switchtec_pci_remove(), after
stdev_kill(). Counting the stdev-&gt;pdev ref is now optional, but may prevent
future accidents.

Reproducible via the script at
https://lore.kernel.org/r/20231113212150.96410-1-dns@arista.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221613">SUSE bug 1221613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52618</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block/rnbd-srv: Check for unlikely string overflow

Since "dev_search_path" can technically be as large as PATH_MAX,
there was a risk of truncation when copying it and a second string
into "full_path" since it was also PATH_MAX sized. The W=1 builds were
reporting this warning:

drivers/block/rnbd/rnbd-srv.c: In function 'process_msg_open.isra':
drivers/block/rnbd/rnbd-srv.c:616:51: warning: '%s' directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=]
  616 |                 snprintf(full_path, PATH_MAX, "%s/%s",
      |                                                   ^~
In function 'rnbd_srv_get_full_path',
    inlined from 'process_msg_open.isra' at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: 'snprintf' output between 2 and 4351 bytes into a destination of size 4096
  616 |                 snprintf(full_path, PATH_MAX, "%s/%s",
      |                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  617 |                          dev_search_path, dev_name);
      |                          ~~~~~~~~~~~~~~~~~~~~~~~~~~

To fix this, unconditionally check for truncation (as was already done
for the case where "%SESSNAME%" was present).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221615">SUSE bug 1221615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52619</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/ram: Fix crash when setting number of cpus to an odd number

When the number of cpu cores is adjusted to 7 or other odd numbers,
the zone size will become an odd number.
The address of the zone will become:
    addr of zone0 = BASE
    addr of zone1 = BASE + zone_size
    addr of zone2 = BASE + zone_size*2
    ...
The address of zone1/3/5/7 will be mapped to non-alignment va.
Eventually crashes will occur when accessing these va.

So, use ALIGN_DOWN() to make sure the zone size is even
to avoid this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221618">SUSE bug 1221618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52620</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow timeout for anonymous sets

Never used from userspace, disallow these parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221825">SUSE bug 1221825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52621</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52621" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers

These three bpf_map_{lookup,update,delete}_elem() helpers are also
available for sleepable bpf program, so add the corresponding lock
assertion for sleepable bpf program, otherwise the following warning
will be reported when a sleepable bpf program manipulates bpf map under
interpreter mode (aka bpf_jit_enable=0):

  WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......
  CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:bpf_map_lookup_elem+0x54/0x60
  ......
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0xa5/0x240
   ? bpf_map_lookup_elem+0x54/0x60
   ? report_bug+0x1ba/0x1f0
   ? handle_bug+0x40/0x80
   ? exc_invalid_op+0x18/0x50
   ? asm_exc_invalid_op+0x1b/0x20
   ? __pfx_bpf_map_lookup_elem+0x10/0x10
   ? rcu_lockdep_current_cpu_online+0x65/0xb0
   ? rcu_is_watching+0x23/0x50
   ? bpf_map_lookup_elem+0x54/0x60
   ? __pfx_bpf_map_lookup_elem+0x10/0x10
   ___bpf_prog_run+0x513/0x3b70
   __bpf_prog_run32+0x9d/0xd0
   ? __bpf_prog_enter_sleepable_recur+0xad/0x120
   ? __bpf_prog_enter_sleepable_recur+0x3e/0x120
   bpf_trampoline_6442580665+0x4d/0x1000
   __x64_sys_getpgid+0x5/0x30
   ? do_syscall_64+0x36/0xb0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid online resizing failures due to oversized flex bg

When we online resize an ext4 filesystem with a oversized flexbg_size,

     mkfs.ext4 -F -G 67108864 $dev -b 4096 100M
     mount $dev $dir
     resize2fs $dev 16G

the following WARN_ON is triggered:
==================================================================
WARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550
Modules linked in: sg(E)
CPU: 0 PID: 427 Comm: resize2fs Tainted: G  E  6.6.0-rc5+ #314
RIP: 0010:__alloc_pages+0x411/0x550
Call Trace:
 &lt;TASK&gt;
 __kmalloc_large_node+0xa2/0x200
 __kmalloc+0x16e/0x290
 ext4_resize_fs+0x481/0xd80
 __ext4_ioctl+0x1616/0x1d90
 ext4_ioctl+0x12/0x20
 __x64_sys_ioctl+0xf0/0x150
 do_syscall_64+0x3b/0x90
==================================================================

This is because flexbg_size is too large and the size of the new_group_data
array to be allocated exceeds MAX_ORDER. Currently, the minimum value of
MAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding
maximum number of groups that can be allocated is:

 (PAGE_SIZE &lt;&lt; MAX_ORDER) / sizeof(struct ext4_new_group_data) ~ 21845

And the value that is down-aligned to the power of 2 is 16384. Therefore,
this value is defined as MAX_RESIZE_BG, and the number of groups added
each time does not exceed this value during resizing, and is added multiple
times to complete the online resizing. The difference is that the metadata
in a flex_bg may be more dispersed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222080">SUSE bug 1222080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52623</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix a suspicious RCU usage warning

I received the following warning while running cthon against an ontap
server running pNFS:

[   57.202521] =============================
[   57.202522] WARNING: suspicious RCU usage
[   57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted
[   57.202525] -----------------------------
[   57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!
[   57.202527]
               other info that might help us debug this:

[   57.202528]
               rcu_scheduler_active = 2, debug_locks = 1
[   57.202529] no locks held by test5/3567.
[   57.202530]
               stack backtrace:
[   57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e
[   57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022
[   57.202536] Call Trace:
[   57.202537]  &lt;TASK&gt;
[   57.202540]  dump_stack_lvl+0x77/0xb0
[   57.202551]  lockdep_rcu_suspicious+0x154/0x1a0
[   57.202556]  rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202596]  rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202621]  ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202646]  rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202671]  ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202696]  nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202728]  ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202754]  nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]
[   57.202760]  filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]
[   57.202765]  pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202788]  __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202813]  nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202831]  nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202849]  nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202866]  write_cache_pages+0x265/0x450
[   57.202870]  ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202891]  nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202913]  do_writepages+0xd2/0x230
[   57.202917]  ? filemap_fdatawrite_wbc+0x5c/0x80
[   57.202921]  filemap_fdatawrite_wbc+0x67/0x80
[   57.202924]  filemap_write_and_wait_range+0xd9/0x170
[   57.202930]  nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202947]  nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202969]  __se_sys_close+0x46/0xd0
[   57.202972]  do_syscall_64+0x68/0x100
[   57.202975]  ? do_syscall_64+0x77/0x100
[   57.202976]  ? do_syscall_64+0x77/0x100
[   57.202979]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[   57.202982] RIP: 0033:0x7fe2b12e4a94
[   57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3
[   57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
[   57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94
[   57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003
[   57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49
[   57.202993] R10: 00007f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222060">SUSE bug 1222060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52627</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7091r: Allow users to configure device events

AD7091R-5 devices are supported by the ad7091r-5 driver together with
the ad7091r-base driver. Those drivers declared iio events for notifying
user space when ADC readings fall bellow the thresholds of low limit
registers or above the values set in high limit registers.
However, to configure iio events and their thresholds, a set of callback
functions must be implemented and those were not present until now.
The consequence of trying to configure ad7091r-5 events without the
proper callback functions was a null pointer dereference in the kernel
because the pointers to the callback functions were not set.

Implement event configuration callbacks allowing users to read/write
event thresholds and enable/disable event generation.

Since the event spec structs are generic to AD7091R devices, also move
those from the ad7091r-5 driver the base driver so they can be reused
when support for ad7091r-2/-4/-8 be added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222051">SUSE bug 1222051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52628</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: exthdr: fix 4-byte stack OOB write

If priv-&gt;len is a multiple of 4, then dst[len / 4] can write past
the destination array which leads to stack corruption.

This construct is necessary to clean the remainder of the register
in case -&gt;len is NOT a multiple of the register size, so make it
conditional just like nft_payload.c does.

The bug was added in 4.1 cycle and then copied/inherited when
tcp/sctp and ip option support was added.

Bug reported by Zero Day Initiative project (ZDI-CAN-21950,
ZDI-CAN-21951, ZDI-CAN-21961).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222118">SUSE bug 1222118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52632</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52632" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix lock dependency warning with srcu

======================================================
WARNING: possible circular locking dependency detected
6.5.0-kfd-yangp #2289 Not tainted
------------------------------------------------------
kworker/0:2/996 is trying to acquire lock:
        (srcu){.+.+}-{0:0}, at: __synchronize_srcu+0x5/0x1a0

but task is already holding lock:
        ((work_completion)(&amp;svms-&gt;deferred_list_work)){+.+.}-{0:0}, at:
	process_one_work+0x211/0x560

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #3 ((work_completion)(&amp;svms-&gt;deferred_list_work)){+.+.}-{0:0}:
        __flush_work+0x88/0x4f0
        svm_range_list_lock_and_flush_work+0x3d/0x110 [amdgpu]
        svm_range_set_attr+0xd6/0x14c0 [amdgpu]
        kfd_ioctl+0x1d1/0x630 [amdgpu]
        __x64_sys_ioctl+0x88/0xc0

-&gt; #2 (&amp;info-&gt;lock#2){+.+.}-{3:3}:
        __mutex_lock+0x99/0xc70
        amdgpu_amdkfd_gpuvm_restore_process_bos+0x54/0x740 [amdgpu]
        restore_process_helper+0x22/0x80 [amdgpu]
        restore_process_worker+0x2d/0xa0 [amdgpu]
        process_one_work+0x29b/0x560
        worker_thread+0x3d/0x3d0

-&gt; #1 ((work_completion)(&amp;(&amp;process-&gt;restore_work)-&gt;work)){+.+.}-{0:0}:
        __flush_work+0x88/0x4f0
        __cancel_work_timer+0x12c/0x1c0
        kfd_process_notifier_release_internal+0x37/0x1f0 [amdgpu]
        __mmu_notifier_release+0xad/0x240
        exit_mmap+0x6a/0x3a0
        mmput+0x6a/0x120
        do_exit+0x322/0xb90
        do_group_exit+0x37/0xa0
        __x64_sys_exit_group+0x18/0x20
        do_syscall_64+0x38/0x80

-&gt; #0 (srcu){.+.+}-{0:0}:
        __lock_acquire+0x1521/0x2510
        lock_sync+0x5f/0x90
        __synchronize_srcu+0x4f/0x1a0
        __mmu_notifier_release+0x128/0x240
        exit_mmap+0x6a/0x3a0
        mmput+0x6a/0x120
        svm_range_deferred_list_work+0x19f/0x350 [amdgpu]
        process_one_work+0x29b/0x560
        worker_thread+0x3d/0x3d0

other info that might help us debug this:
Chain exists of:
  srcu --&gt; &amp;info-&gt;lock#2 --&gt; (work_completion)(&amp;svms-&gt;deferred_list_work)

Possible unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
        lock((work_completion)(&amp;svms-&gt;deferred_list_work));
                        lock(&amp;info-&gt;lock#2);
			lock((work_completion)(&amp;svms-&gt;deferred_list_work));
        sync(srcu);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222274">SUSE bug 1222274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52635</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Synchronize devfreq_monitor_[start/stop]

There is a chance if a frequent switch of the governor
done in a loop result in timer list corruption where
timer cancel being done from two place one from
cancel_delayed_work_sync() and followed by expire_timers()
can be seen from the traces[1].

while true
do
        echo "simple_ondemand" &gt; /sys/class/devfreq/1d84000.ufshc/governor
        echo "performance" &gt; /sys/class/devfreq/1d84000.ufshc/governor
done

It looks to be issue with devfreq driver where
device_monitor_[start/stop] need to synchronized so that
delayed work should get corrupted while it is either
being queued or running or being cancelled.

Let's use polling flag and devfreq lock to synchronize the
queueing the timer instance twice and work data being
corrupted.

[1]
...
..
&lt;idle&gt;-0    [003]   9436.209662:  timer_cancel   timer=0xffffff80444f0428
&lt;idle&gt;-0    [003]   9436.209664:  timer_expire_entry   timer=0xffffff80444f0428  now=0x10022da1c  function=__typeid__ZTSFvP10timer_listE_global_addr  baseclk=0x10022da1c
&lt;idle&gt;-0    [003]   9436.209718:  timer_expire_exit   timer=0xffffff80444f0428
kworker/u16:6-14217    [003]   9436.209863:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2b  now=0x10022da1c  flags=182452227
vendor.xxxyyy.ha-1593    [004]   9436.209888:  timer_cancel   timer=0xffffff80444f0428
vendor.xxxyyy.ha-1593    [004]   9436.216390:  timer_init   timer=0xffffff80444f0428
vendor.xxxyyy.ha-1593    [004]   9436.216392:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2c  now=0x10022da1d  flags=186646532
vendor.xxxyyy.ha-1593    [005]   9436.220992:  timer_cancel   timer=0xffffff80444f0428
xxxyyyTraceManag-7795    [004]   9436.261641:  timer_cancel   timer=0xffffff80444f0428

[2]

 9436.261653][    C4] Unable to handle kernel paging request at virtual address dead00000000012a
[ 9436.261664][    C4] Mem abort info:
[ 9436.261666][    C4]   ESR = 0x96000044
[ 9436.261669][    C4]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 9436.261671][    C4]   SET = 0, FnV = 0
[ 9436.261673][    C4]   EA = 0, S1PTW = 0
[ 9436.261675][    C4] Data abort info:
[ 9436.261677][    C4]   ISV = 0, ISS = 0x00000044
[ 9436.261680][    C4]   CM = 0, WnR = 1
[ 9436.261682][    C4] [dead00000000012a] address between user and kernel address ranges
[ 9436.261685][    C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[ 9436.261701][    C4] Skip md ftrace buffer dump for: 0x3a982d0
...

[ 9436.262138][    C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S      W  O      5.10.149-android12-9-o-g17f915d29d0c #1
[ 9436.262141][    C4] Hardware name: Qualcomm Technologies, Inc.  (DT)
[ 9436.262144][    C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)
[ 9436.262161][    C4] pc : expire_timers+0x9c/0x438
[ 9436.262164][    C4] lr : expire_timers+0x2a4/0x438
[ 9436.262168][    C4] sp : ffffffc010023dd0
[ 9436.262171][    C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18
[ 9436.262178][    C4] x27: ffffffd063569dd0 x26: ffffffd063536008
[ 9436.262182][    C4] x25: 0000000000000001 x24: ffffff88f7c69280
[ 9436.262185][    C4] x23: 00000000000000e0 x22: dead000000000122
[ 9436.262188][    C4] x21: 000000010022da29 x20: ffffff8af72b4e80
[ 9436.262191][    C4] x19: ffffffc010023e50 x18: ffffffc010025038
[ 9436.262195][    C4] x17: 0000000000000240 x16: 0000000000000201
[ 9436.262199][    C4] x15: ffffffffffffffff x14: ffffff889f3c3100
[ 9436.262203][    C4] x13: ffffff889f3c3100 x12: 00000000049f56b8
[ 9436.262207][    C4] x11: 00000000049f56b8 x10: 00000000ffffffff
[ 9436.262212][    C4] x9 : ffffffc010023e50 x8 : dead000000000122
[ 9436.262216][    C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8
[ 9436.262220][    C4] x5 : 0000000000000000 x4 : 0000000000000101
[ 9436.262223][    C4] x3 : 0000000000000080 x2 : ffffff8
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222294">SUSE bug 1222294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52636</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52636" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: just wait for more data to be available on the socket

A short read may occur while reading the message footer from the
socket.  Later, when the socket is ready for another read, the
messenger invokes all read_partial_*() handlers, including
read_partial_sparse_msg_data().  The expectation is that
read_partial_sparse_msg_data() would bail, allowing the messenger to
invoke read_partial() for the footer and pick up where it left off.

However read_partial_sparse_msg_data() violates that and ends up
calling into the state machine in the OSD client.  The sparse-read
state machine assumes that it's a new op and interprets some piece of
the footer as the sparse-read header and returns bogus extents/data
length, etc.

To determine whether read_partial_sparse_msg_data() should bail, let's
reuse cursor-&gt;total_resid.  Because once it reaches to zero that means
all the extents and data have been successfully received in last read,
else it could break out when partially reading any of the extents and
data.  And then osd_sparse_read() could continue where it left off.

[ idryomov: changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222247">SUSE bug 1222247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52637</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)

Lock jsk-&gt;sk to prevent UAF when setsockopt(..., SO_J1939_FILTER, ...)
modifies jsk-&gt;filters while receiving packets.

Following trace was seen on affected system:
 ==================================================================
 BUG: KASAN: slab-use-after-free in j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
 Read of size 4 at addr ffff888012144014 by task j1939/350

 CPU: 0 PID: 350 Comm: j1939 Tainted: G        W  OE      6.5.0-rc5 #1
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
 Call Trace:
  print_report+0xd3/0x620
  ? kasan_complete_mode_report_info+0x7d/0x200
  ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
  kasan_report+0xc2/0x100
  ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
  __asan_load4+0x84/0xb0
  j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
  j1939_sk_recv+0x20b/0x320 [can_j1939]
  ? __kasan_check_write+0x18/0x20
  ? __pfx_j1939_sk_recv+0x10/0x10 [can_j1939]
  ? j1939_simple_recv+0x69/0x280 [can_j1939]
  ? j1939_ac_recv+0x5e/0x310 [can_j1939]
  j1939_can_recv+0x43f/0x580 [can_j1939]
  ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939]
  ? raw_rcv+0x42/0x3c0 [can_raw]
  ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939]
  can_rcv_filter+0x11f/0x350 [can]
  can_receive+0x12f/0x190 [can]
  ? __pfx_can_rcv+0x10/0x10 [can]
  can_rcv+0xdd/0x130 [can]
  ? __pfx_can_rcv+0x10/0x10 [can]
  __netif_receive_skb_one_core+0x13d/0x150
  ? __pfx___netif_receive_skb_one_core+0x10/0x10
  ? __kasan_check_write+0x18/0x20
  ? _raw_spin_lock_irq+0x8c/0xe0
  __netif_receive_skb+0x23/0xb0
  process_backlog+0x107/0x260
  __napi_poll+0x69/0x310
  net_rx_action+0x2a1/0x580
  ? __pfx_net_rx_action+0x10/0x10
  ? __pfx__raw_spin_lock+0x10/0x10
  ? handle_irq_event+0x7d/0xa0
  __do_softirq+0xf3/0x3f8
  do_softirq+0x53/0x80
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  __local_bh_enable_ip+0x6e/0x70
  netif_rx+0x16b/0x180
  can_send+0x32b/0x520 [can]
  ? __pfx_can_send+0x10/0x10 [can]
  ? __check_object_size+0x299/0x410
  raw_sendmsg+0x572/0x6d0 [can_raw]
  ? __pfx_raw_sendmsg+0x10/0x10 [can_raw]
  ? apparmor_socket_sendmsg+0x2f/0x40
  ? __pfx_raw_sendmsg+0x10/0x10 [can_raw]
  sock_sendmsg+0xef/0x100
  sock_write_iter+0x162/0x220
  ? __pfx_sock_write_iter+0x10/0x10
  ? __rtnl_unlock+0x47/0x80
  ? security_file_permission+0x54/0x320
  vfs_write+0x6ba/0x750
  ? __pfx_vfs_write+0x10/0x10
  ? __fget_light+0x1ca/0x1f0
  ? __rcu_read_unlock+0x5b/0x280
  ksys_write+0x143/0x170
  ? __pfx_ksys_write+0x10/0x10
  ? __kasan_check_read+0x15/0x20
  ? fpregs_assert_state_consistent+0x62/0x70
  __x64_sys_write+0x47/0x60
  do_syscall_64+0x60/0x90
  ? do_syscall_64+0x6d/0x90
  ? irqentry_exit+0x3f/0x50
  ? exc_page_fault+0x79/0xf0
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

 Allocated by task 348:
  kasan_save_stack+0x2a/0x50
  kasan_set_track+0x29/0x40
  kasan_save_alloc_info+0x1f/0x30
  __kasan_kmalloc+0xb5/0xc0
  __kmalloc_node_track_caller+0x67/0x160
  j1939_sk_setsockopt+0x284/0x450 [can_j1939]
  __sys_setsockopt+0x15c/0x2f0
  __x64_sys_setsockopt+0x6b/0x80
  do_syscall_64+0x60/0x90
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

 Freed by task 349:
  kasan_save_stack+0x2a/0x50
  kasan_set_track+0x29/0x40
  kasan_save_free_info+0x2f/0x50
  __kasan_slab_free+0x12e/0x1c0
  __kmem_cache_free+0x1b9/0x380
  kfree+0x7a/0x120
  j1939_sk_setsockopt+0x3b2/0x450 [can_j1939]
  __sys_setsockopt+0x15c/0x2f0
  __x64_sys_setsockopt+0x6b/0x80
  do_syscall_64+0x60/0x90
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222291">SUSE bug 1222291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52639</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: vsie: fix race during shadow creation

Right now it is possible to see gmap-&gt;private being zero in
kvm_s390_vsie_gmap_notifier resulting in a crash.  This is due to the
fact that we add gmap-&gt;private == kvm after creation:

static int acquire_gmap_shadow(struct kvm_vcpu *vcpu,
                               struct vsie_page *vsie_page)
{
[...]
        gmap = gmap_shadow(vcpu-&gt;arch.gmap, asce, edat);
        if (IS_ERR(gmap))
                return PTR_ERR(gmap);
        gmap-&gt;private = vcpu-&gt;kvm;

Let children inherit the private field of the parent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222300">SUSE bug 1222300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52642</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rc: bpf attach/detach requires write permission

Note that bpf attach/detach also requires CAP_NET_ADMIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223031">SUSE bug 1223031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52643</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52643" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: core: fix memleak in iio_device_register_sysfs

When iio_device_register_sysfs_group() fails, we should
free iio_dev_opaque-&gt;chan_attr_group.attrs to prevent
potential memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222960">SUSE bug 1222960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52644</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled

When QoS is disabled, the queue priority value will not map to the correct
ieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS
is disabled to prevent trying to stop/wake a non-existent queue and failing
to stop/wake the actual queue instantiated.

Log of issue before change (with kernel parameter qos=0):
    [  +5.112651] ------------[ cut here ]------------
    [  +0.000005] WARNING: CPU: 7 PID: 25513 at net/mac80211/util.c:449 __ieee80211_wake_queue+0xd5/0x180 [mac80211]
    [  +0.000067] Modules linked in: b43(O) snd_seq_dummy snd_hrtimer snd_seq snd_seq_device nft_chain_nat xt_MASQUERADE nf_nat xfrm_user xfrm_algo xt_addrtype overlay ccm af_packet amdgpu snd_hda_codec_cirrus snd_hda_codec_generic ledtrig_audio drm_exec amdxcp gpu_sched xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_rpfilter ipt_rpfilter xt_pkttype xt_LOG nf_log_syslog xt_tcpudp nft_compat nf_tables nfnetlink sch_fq_codel btusb uinput iTCO_wdt ctr btrtl intel_pmc_bxt i915 intel_rapl_msr mei_hdcp mei_pxp joydev at24 watchdog btintel atkbd libps2 serio radeon btbcm vivaldi_fmap btmtk intel_rapl_common snd_hda_codec_hdmi bluetooth uvcvideo nls_iso8859_1 applesmc nls_cp437 x86_pkg_temp_thermal snd_hda_intel intel_powerclamp vfat videobuf2_vmalloc coretemp fat snd_intel_dspcfg crc32_pclmul uvc polyval_clmulni snd_intel_sdw_acpi loop videobuf2_memops snd_hda_codec tun drm_suballoc_helper polyval_generic drm_ttm_helper drm_buddy tap ecdh_generic videobuf2_v4l2 gf128mul macvlan ttm ghash_clmulni_intel ecc tg3
    [  +0.000044]  videodev bridge snd_hda_core rapl crc16 drm_display_helper cec mousedev snd_hwdep evdev intel_cstate bcm5974 hid_appleir videobuf2_common stp mac_hid libphy snd_pcm drm_kms_helper acpi_als mei_me intel_uncore llc mc snd_timer intel_gtt industrialio_triggered_buffer apple_mfi_fastcharge i2c_i801 mei snd lpc_ich agpgart ptp i2c_smbus thunderbolt apple_gmux i2c_algo_bit kfifo_buf video industrialio soundcore pps_core wmi tiny_power_button sbs sbshc button ac cordic bcma mac80211 cfg80211 ssb rfkill libarc4 kvm_intel kvm drm irqbypass fuse backlight firmware_class efi_pstore configfs efivarfs dmi_sysfs ip_tables x_tables autofs4 dm_crypt cbc encrypted_keys trusted asn1_encoder tee tpm rng_core input_leds hid_apple led_class hid_generic usbhid hid sd_mod t10_pi crc64_rocksoft crc64 crc_t10dif crct10dif_generic ahci libahci libata uhci_hcd ehci_pci ehci_hcd crct10dif_pclmul crct10dif_common sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel usbcore scsi_mod libaes crypto_simd cryptd scsi_common
    [  +0.000055]  usb_common rtc_cmos btrfs blake2b_generic libcrc32c crc32c_generic crc32c_intel xor raid6_pq dm_snapshot dm_bufio dm_mod dax [last unloaded: b43(O)]
    [  +0.000009] CPU: 7 PID: 25513 Comm: irq/17-b43 Tainted: G        W  O       6.6.7 #1-NixOS
    [  +0.000003] Hardware name: Apple Inc. MacBookPro8,3/Mac-942459F5819B171B, BIOS 87.0.0.0.0 06/13/2019
    [  +0.000001] RIP: 0010:__ieee80211_wake_queue+0xd5/0x180 [mac80211]
    [  +0.000046] Code: 00 45 85 e4 0f 85 9b 00 00 00 48 8d bd 40 09 00 00 f0 48 0f ba ad 48 09 00 00 00 72 0f 5b 5d 41 5c 41 5d 41 5e e9 cb 6d 3c d0 &lt;0f&gt; 0b 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc 48 8d b4 16 94 00 00
    [  +0.000002] RSP: 0018:ffffc90003c77d60 EFLAGS: 00010097
    [  +0.000001] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 0000000000000000
    [  +0.000001] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88820b924900
    [  +0.000002] RBP: ffff88820b924900 R08: ffffc90003c77d90 R09: 000000000003bfd0
    [  +0.000001] R10: ffff88820b924900 R11: ffffc90003c77c68 R12: 0000000000000000
    [  +0.000001] R13: 0000000000000000 R14: ffffc90003c77d90 R15: ffffffffc0fa6f40
    [  +0.000001] FS:  0000000000000000(0000) GS:ffff88846fb80000(0000) knlGS:0000000000000000
    [  +0.000001] CS:  0010 DS: 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222961">SUSE bug 1222961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52645</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: mediatek: fix race conditions with genpd

If the power domains are registered first with genpd and *after that*
the driver attempts to power them on in the probe sequence, then it is
possible that a race condition occurs if genpd tries to power them on
in the same time.
The same is valid for powering them off before unregistering them
from genpd.
Attempt to fix race conditions by first removing the domains from genpd
and *after that* powering down domains.
Also first power up the domains and *after that* register them
to genpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223033">SUSE bug 1223033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52646</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52646" ref_url="https://www.suse.com/security/cve/CVE-2023-52646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aio: fix mremap after fork null-deref

Commit e4a0d3e720e7 ("aio: Make it possible to remap aio ring") introduced
a null-deref if mremap is called on an old aio mapping after fork as
mm-&gt;ioctx_table will be set to NULL.

[jmoyer@redhat.com: fix 80 column issue]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52646/">CVE-2023-52646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52646">CVE-2023-52646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223432">SUSE bug 1223432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52650</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: dsi: Add missing check for of_find_device_by_node

Add check for the return value of of_find_device_by_node() and return
the error if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223770">SUSE bug 1223770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NTB: fix possible name leak in ntb_register_device()

If device_register() fails in ntb_register_device(), the device name
allocated by dev_set_name() should be freed. As per the comment in
device_register(), callers should use put_device() to give up the
reference in the error path. So fix this by calling put_device() in the
error path so that the name can be freed in kobject_cleanup().

As a result of this, put_device() in the error path of
ntb_register_device() is removed and the actual error is returned.

[mani: reworded commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223686">SUSE bug 1223686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52653</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: fix a memleak in gss_import_v2_context

The ctx-&gt;mech_used.data allocated by kmemdup is not freed in neither
gss_import_v2_context nor it only caller gss_krb5_import_sec_context,
which frees ctx on error.

Thus, this patch reform the last call of gss_import_v2_context to the
gss_krb5_import_ctx_v2, preventing the memleak while keepping the return
formation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223712">SUSE bug 1223712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52654</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52654" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/af_unix: disable sending io_uring over sockets

File reference cycles have caused lots of problems for io_uring
in the past, and it still doesn't work exactly right and races with
unix_stream_read_generic(). The safest fix would be to completely
disallow sending io_uring files via sockets via SCM_RIGHT, so there
are no possible cycles invloving registered files and thus rendering
SCM accounting on the io_uring side unnecessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: aqc111: check packet for fixup for true limit

If a device sends a packet that is inbetween 0
and sizeof(u64) the value passed to skb_trim()
as length will wrap around ending up as some very
large value.

The driver will then proceed to parse the header
located at that position, which will either oops or
process some random value.

The fix is to check against sizeof(u64) rather than
0, which the driver currently does. The issue exists
since the introduction of the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52656</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: drop any code related to SCM_RIGHTS

This is dead code after we dropped support for passing io_uring fds
over SCM_RIGHTS, get rid of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224187">SUSE bug 1224187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52657</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52657" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "drm/amd/pm: resolve reboot exception for si oland"

This reverts commit e490d60a2f76bff636c68ce4fe34c1b6c34bbd86.

This causes hangs on SI when DC is enabled and errors on driver
reboot and power off cycles.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224722">SUSE bug 1224722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52658</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52658" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"

This reverts commit 662404b24a4c4d839839ed25e3097571f5938b9b.
The revert is required due to the suspicion it is not good for anything
and cause crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224719">SUSE bug 1224719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52659</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52659" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type

On 64-bit platforms, the pfn_to_kaddr() macro requires that the input
value is 64 bits in order to ensure that valid address bits don't get
lost when shifting that input by PAGE_SHIFT to calculate the physical
address to provide a virtual address for.

One such example is in pvalidate_pages() (used by SEV-SNP guests), where
the GFN in the struct used for page-state change requests is a 40-bit
bit-field, so attempts to pass this GFN field directly into
pfn_to_kaddr() ends up causing guest crashes when dealing with addresses
above the 1TB range due to the above.

Fix this issue with SEV-SNP guests, as well as any similar cases that
might cause issues in current/future code, by using an inline function,
instead of a macro, so that the input is implicitly cast to the
expected 64-bit input type prior to performing the shift operation.

While it might be argued that the issue is on the caller side, other
archs/macros have taken similar approaches to deal with instances like
this, such as ARM explicitly casting the input to phys_addr_t:

  e48866647b48 ("ARM: 8396/1: use phys_addr_t in pfn_to_kaddr()")

A C inline function is even better though.

[ mingo: Refined the changelog some more &amp; added __always_inline. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224442">SUSE bug 1224442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52660" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rkisp1: Fix IRQ handling due to shared interrupts

The driver requests the interrupts as IRQF_SHARED, so the interrupt
handlers can be called at any time. If such a call happens while the ISP
is powered down, the SoC will hang as the driver tries to access the
ISP registers.

This can be reproduced even without the platform sharing the IRQ line:
Enable CONFIG_DEBUG_SHIRQ and unload the driver, and the board will
hang.

Fix this by adding a new field, 'irqs_enabled', which is used to bail
out from the interrupt handler when the ISP is not operational.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224443">SUSE bug 1224443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52661" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()

If clk_get_sys(..., "pll_d2_out0") fails, the clk_get_sys() call must be
undone.

Add the missing clk_put and a new 'put_pll_d_out0' label in the error
handling path, and use it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224445">SUSE bug 1224445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52662</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node

When ida_alloc_max fails, resources allocated before should be freed,
including *res allocated by kmalloc and ttm_resource_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224449">SUSE bug 1224449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52664</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52664" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: eliminate double free in error handling logic

Driver has a logic leak in ring data allocation/free,
where aq_ring_free could be called multiple times on same ring,
if system is under stress and got memory allocation error.

Ring pointer was used as an indicator of failure, but this is
not correct since only ring data is allocated/deallocated.
Ring itself is an array member.

Changing ring allocation functions to return error code directly.
This simplifies error handling and eliminates aq_ring_free
on higher layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224747">SUSE bug 1224747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a potential double-free in fs_any_create_groups

When kcalloc() for ft-&gt;g succeeds but kvzalloc() for in fails,
fs_any_create_groups() will free ft-&gt;g. However, its caller
fs_any_create_table() will free ft-&gt;g again through calling
mlx5e_destroy_flow_table(), which will lead to a double-free.
Fix this by setting ft-&gt;g to NULL in fs_any_create_groups().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224603">SUSE bug 1224603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52669</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: s390/aes - Fix buffer overread in CTR mode

When processing the last block, the s390 ctr code will always read
a whole block, even if there isn't a whole block of data left.  Fix
this by using the actual length left and copy it into a buffer first
for processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224637">SUSE bug 1224637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52670" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: virtio: Free driver_override when rpmsg_remove()

Free driver_override when rpmsg_remove(), otherwise
the following memory leak will occur:

unreferenced object 0xffff0000d55d7080 (size 128):
  comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s)
  hex dump (first 32 bytes):
    72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00  rpmsg_ns........
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;000000009c94c9c1&gt;] __kmem_cache_alloc_node+0x1f8/0x320
    [&lt;000000002300d89b&gt;] __kmalloc_node_track_caller+0x44/0x70
    [&lt;00000000228a60c3&gt;] kstrndup+0x4c/0x90
    [&lt;0000000077158695&gt;] driver_set_override+0xd0/0x164
    [&lt;000000003e9c4ea5&gt;] rpmsg_register_device_override+0x98/0x170
    [&lt;000000001c0c89a8&gt;] rpmsg_ns_register_device+0x24/0x30
    [&lt;000000008bbf8fa2&gt;] rpmsg_probe+0x2e0/0x3ec
    [&lt;00000000e65a68df&gt;] virtio_dev_probe+0x1c0/0x280
    [&lt;00000000443331cc&gt;] really_probe+0xbc/0x2dc
    [&lt;00000000391064b1&gt;] __driver_probe_device+0x78/0xe0
    [&lt;00000000a41c9a5b&gt;] driver_probe_device+0xd8/0x160
    [&lt;000000009c3bd5df&gt;] __device_attach_driver+0xb8/0x140
    [&lt;0000000043cd7614&gt;] bus_for_each_drv+0x7c/0xd4
    [&lt;000000003b929a36&gt;] __device_attach+0x9c/0x19c
    [&lt;00000000a94e0ba8&gt;] device_initial_probe+0x14/0x20
    [&lt;000000003c999637&gt;] bus_probe_device+0xa0/0xac
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52671</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52671" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix hang/underflow when transitioning to ODM4:1

[Why]
Under some circumstances, disabling an OPTC and attempting to reclaim
its OPP(s) for a different OPTC could cause a hang/underflow due to OPPs
not being properly disconnected from the disabled OPTC.

[How]
Ensure that all OPPs are unassigned from an OPTC when it gets disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224729">SUSE bug 1224729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52672</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52672" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pipe: wakeup wr_wait after setting max_usage

Commit c73be61cede5 ("pipe: Add general notification queue support") a
regression was introduced that would lock up resized pipes under certain
conditions. See the reproducer in [1].

The commit resizing the pipe ring size was moved to a different
function, doing that moved the wakeup for pipe-&gt;wr_wait before actually
raising pipe-&gt;max_usage. If a pipe was full before the resize occured it
would result in the wakeup never actually triggering pipe_write.

Set @max_usage and @nr_accounted before waking writers if this isn't a
watch queue.

[Christian Brauner &lt;brauner@kernel.org&gt;: rewrite to account for watch queues]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224614">SUSE bug 1224614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52674</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52674" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()

Ensure the value passed to scarlett2_mixer_ctl_put() is between 0 and
SCARLETT2_MIXER_MAX_VALUE so we don't attempt to access outside
scarlett2_mixer_values[].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224727">SUSE bug 1224727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52675</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52675" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/imc-pmu: Add a null pointer check in update_events_in_group()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224504">SUSE bug 1224504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52676</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52676" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Guard stack limits against 32bit overflow

This patch promotes the arithmetic around checking stack bounds to be
done in the 64-bit domain, instead of the current 32bit. The arithmetic
implies adding together a 64-bit register with a int offset. The
register was checked to be below 1&lt;&lt;29 when it was variable, but not
when it was fixed. The offset either comes from an instruction (in which
case it is 16 bit), from another register (in which case the caller
checked it to be below 1&lt;&lt;29 [1]), or from the size of an argument to a
kfunc (in which case it can be a u32 [2]). Between the register being
inconsistently checked to be below 1&lt;&lt;29, and the offset being up to an
u32, it appears that we were open to overflowing the `int`s which were
currently used for arithmetic.

[1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498
[2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226336">SUSE bug 1226336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52678</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52678" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c

Before using list_first_entry, make sure to check that list is not
empty, if list is empty return -ENODATA.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1347 kfd_create_indirect_link_prop() warn: can 'gpu_link' even be NULL?
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1428 kfd_add_peer_prop() warn: can 'iolink1' even be NULL?
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1433 kfd_add_peer_prop() warn: can 'iolink2' even be NULL?
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224617">SUSE bug 1224617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52679</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52679" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: Fix double free in of_parse_phandle_with_args_map

In of_parse_phandle_with_args_map() the inner loop that
iterates through the map entries calls of_node_put(new)
to free the reference acquired by the previous iteration
of the inner loop. This assumes that the value of "new" is
NULL on the first iteration of the inner loop.

Make sure that this is true in all iterations of the outer
loop by setting "new" to NULL after its value is assigned to "cur".

Extend the unittest to detect the double free and add an additional
test case that actually triggers this path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224508">SUSE bug 1224508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52680</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52680" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add missing error checks to *_ctl_get()

The *_ctl_get() functions which call scarlett2_update_*() were not
checking the return value. Fix to check the return value and pass to
the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224608">SUSE bug 1224608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52683</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52683" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: LPIT: Avoid u32 multiplication overflow

In lpit_update_residency() there is a possibility of overflow
in multiplication, if tsc_khz is large enough (&gt; UINT_MAX/1000).

Change multiplication to mul_u32_u32().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224627">SUSE bug 1224627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52685</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52685" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224728">SUSE bug 1224728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52686</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check in opal_event_init()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52690</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52690" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check to scom_debug_init_one()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
Add a null pointer check, and release 'ent' to avoid memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52691</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52691" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix a double-free in si_dpm_init

When the allocation of
adev-&gt;pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,
amdgpu_free_extended_power_table is called to free some fields of adev.
However, when the control flow returns to si_dpm_sw_init, it goes to
label dpm_failed and calls si_dpm_fini, which calls
amdgpu_free_extended_power_table again and free those fields again. Thus
a double-free is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224607">SUSE bug 1224607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52692" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add missing error check to scarlett2_usb_set_config()

scarlett2_usb_set_config() calls scarlett2_usb_get() but was not
checking the result. Return the error if it fails rather than
continuing with an invalid value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224628">SUSE bug 1224628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: video: check for error while searching for backlight device parent

If acpi_get_parent() called in acpi_video_dev_register_backlight()
fails, for example, because acpi_ut_acquire_mutex() fails inside
acpi_get_parent), this can lead to incorrect (uninitialized)
acpi_parent handle being passed to acpi_get_pci_dev() for detecting
the parent pci device.

Check acpi_get_parent() result and set parent device only in case of success.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224686">SUSE bug 1224686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52694</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52694" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function

With tpd12s015_remove() marked with __exit this function is discarded
when the driver is compiled as a built-in. The result is that when the
driver unbinds there is no cleanup done which results in resource
leakage or worse.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224598">SUSE bug 1224598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52696</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52696" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check in opal_powercap_init()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224601">SUSE bug 1224601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52698" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

calipso: fix memory leak in netlbl_calipso_add_pass()

If IPv6 support is disabled at boot (ipv6.disable=1),
the calipso_init() -&gt; netlbl_calipso_ops_register() function isn't called,
and the netlbl_calipso_ops_get() function always returns NULL.
In this case, the netlbl_calipso_add_pass() function allocates memory
for the doi_def variable but doesn't free it with the calipso_doi_free().

BUG: memory leak
unreferenced object 0xffff888011d68180 (size 64):
  comm "syz-executor.1", pid 10746, jiffies 4295410986 (age 17.928s)
  hex dump (first 32 bytes):
    00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;...&gt;] kmalloc include/linux/slab.h:552 [inline]
    [&lt;...&gt;] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]
    [&lt;...&gt;] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111
    [&lt;...&gt;] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739
    [&lt;...&gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
    [&lt;...&gt;] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800
    [&lt;...&gt;] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515
    [&lt;...&gt;] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811
    [&lt;...&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
    [&lt;...&gt;] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339
    [&lt;...&gt;] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934
    [&lt;...&gt;] sock_sendmsg_nosec net/socket.c:651 [inline]
    [&lt;...&gt;] sock_sendmsg+0x157/0x190 net/socket.c:671
    [&lt;...&gt;] ____sys_sendmsg+0x712/0x870 net/socket.c:2342
    [&lt;...&gt;] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396
    [&lt;...&gt;] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429
    [&lt;...&gt;] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
    [&lt;...&gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller

[PM: merged via the LSM tree at Jakub Kicinski request]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224621">SUSE bug 1224621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52699</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysv: don't call sb_bread() with pointers_lock held

syzbot is reporting sleep in atomic context in SysV filesystem [1], for
sb_bread() is called with rw_spinlock held.

A "write_lock(&amp;pointers_lock) =&gt; read_lock(&amp;pointers_lock) deadlock" bug
and a "sb_bread() with write_lock(&amp;pointers_lock)" bug were introduced by
"Replace BKL for chain locking with sysvfs-private rwlock" in Linux 2.5.12.

Then, "[PATCH] err1-40: sysvfs locking fix" in Linux 2.6.8 fixed the
former bug by moving pointers_lock lock to the callers, but instead
introduced a "sb_bread() with read_lock(&amp;pointers_lock)" bug (which made
this problem easier to hit).

Al Viro suggested that why not to do like get_branch()/get_block()/
find_shared() in Minix filesystem does. And doing like that is almost a
revert of "[PATCH] err1-40: sysvfs locking fix" except that get_branch()
 from with find_shared() is called without write_lock(&amp;pointers_lock).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224659">SUSE bug 1224659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52702</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52702" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()

old_meter needs to be free after it is detached regardless of whether
the new meter is successfully attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52703</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path

syzbot reported that act_len in kalmia_send_init_packet() is
uninitialized when passing it to the first usb_bulk_msg error path. Jiri
Pirko noted that it's pointless to pass it in the error path, and that
the value that would be printed in the second error path would be the
value of act_len from the first call to usb_bulk_msg.[1]

With this in mind, let's just not pass act_len to the usb_bulk_msg error
paths.

1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52705</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52705" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52705" ref_url="https://www.suse.com/security/cve/CVE-2023-52705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix underflow in second superblock position calculations

Macro NILFS_SB2_OFFSET_BYTES, which computes the position of the second
superblock, underflows when the argument device size is less than 4096
bytes.  Therefore, when using this macro, it is necessary to check in
advance that the device size is not less than a lower limit, or at least
that underflow does not occur.

The current nilfs2 implementation lacks this check, causing out-of-bound
block access when mounting devices smaller than 4096 bytes:

 I/O error, dev loop0, sector 36028797018963960 op 0x0:(READ) flags 0x0
 phys_seg 1 prio class 2
 NILFS (loop0): unable to read secondary superblock (blocksize = 1024)

In addition, when trying to resize the filesystem to a size below 4096
bytes, this underflow occurs in nilfs_resize_fs(), passing a huge number
of segments to nilfs_sufile_resize(), corrupting parameters such as the
number of segments in superblocks.  This causes excessive loop iterations
in nilfs_sufile_resize() during a subsequent resize ioctl, causing
semaphore ns_segctor_sem to block for a long time and hang the writer
thread:

 INFO: task segctord:5067 blocked for more than 143 seconds.
      Not tainted 6.2.0-rc8-syzkaller-00015-gf6feea56f66d #0
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:segctord        state:D stack:23456 pid:5067  ppid:2
 flags:0x00004000
 Call Trace:
  &lt;TASK&gt;
  context_switch kernel/sched/core.c:5293 [inline]
  __schedule+0x1409/0x43f0 kernel/sched/core.c:6606
  schedule+0xc3/0x190 kernel/sched/core.c:6682
  rwsem_down_write_slowpath+0xfcf/0x14a0 kernel/locking/rwsem.c:1190
  nilfs_transaction_lock+0x25c/0x4f0 fs/nilfs2/segment.c:357
  nilfs_segctor_thread_construct fs/nilfs2/segment.c:2486 [inline]
  nilfs_segctor_thread+0x52f/0x1140 fs/nilfs2/segment.c:2570
  kthread+0x270/0x300 kernel/kthread.c:376
  ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
  &lt;/TASK&gt;
 ...
 Call Trace:
  &lt;TASK&gt;
  folio_mark_accessed+0x51c/0xf00 mm/swap.c:515
  __nilfs_get_page_block fs/nilfs2/page.c:42 [inline]
  nilfs_grab_buffer+0x3d3/0x540 fs/nilfs2/page.c:61
  nilfs_mdt_submit_block+0xd7/0x8f0 fs/nilfs2/mdt.c:121
  nilfs_mdt_read_block+0xeb/0x430 fs/nilfs2/mdt.c:176
  nilfs_mdt_get_block+0x12d/0xbb0 fs/nilfs2/mdt.c:251
  nilfs_sufile_get_segment_usage_block fs/nilfs2/sufile.c:92 [inline]
  nilfs_sufile_truncate_range fs/nilfs2/sufile.c:679 [inline]
  nilfs_sufile_resize+0x7a3/0x12b0 fs/nilfs2/sufile.c:777
  nilfs_resize_fs+0x20c/0xed0 fs/nilfs2/super.c:422
  nilfs_ioctl_resize fs/nilfs2/ioctl.c:1033 [inline]
  nilfs_ioctl+0x137c/0x2440 fs/nilfs2/ioctl.c:1301
  ...

This fixes these issues by inserting appropriate minimum device size
checks or anti-underflow checks, depending on where the macro is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52705/">CVE-2023-52705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52705">CVE-2023-52705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225480">SUSE bug 1225480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52707</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/psi: Fix use-after-free in ep_remove_wait_queue()

If a non-root cgroup gets removed when there is a thread that registered
trigger and is polling on a pressure file within the cgroup, the polling
waitqueue gets freed in the following path:

 do_rmdir
   cgroup_rmdir
     kernfs_drain_open_files
       cgroup_file_release
         cgroup_pressure_release
           psi_trigger_destroy

However, the polling thread still has a reference to the pressure file and
will access the freed waitqueue when the file is closed or upon exit:

 fput
   ep_eventpoll_release
     ep_free
       ep_remove_wait_queue
         remove_wait_queue

This results in use-after-free as pasted below.

The fundamental problem here is that cgroup_file_release() (and
consequently waitqueue's lifetime) is not tied to the file's real lifetime.
Using wake_up_pollfree() here might be less than ideal, but it is in line
with the comment at commit 42288cb44c4b ("wait: add wake_up_pollfree()")
since the waitqueue's lifetime is not tied to file's one and can be
considered as another special case. While this would be fixable by somehow
making cgroup_file_release() be tied to the fput(), it would require
sizable refactoring at cgroups or higher layer which might be more
justifiable if we identify more cases like this.

  BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0
  Write of size 4 at addr ffff88810e625328 by task a.out/4404

	CPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38
	Hardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017
	Call Trace:
	&lt;TASK&gt;
	dump_stack_lvl+0x73/0xa0
	print_report+0x16c/0x4e0
	kasan_report+0xc3/0xf0
	kasan_check_range+0x2d2/0x310
	_raw_spin_lock_irqsave+0x60/0xc0
	remove_wait_queue+0x1a/0xa0
	ep_free+0x12c/0x170
	ep_eventpoll_release+0x26/0x30
	__fput+0x202/0x400
	task_work_run+0x11d/0x170
	do_exit+0x495/0x1130
	do_group_exit+0x100/0x100
	get_signal+0xd67/0xde0
	arch_do_signal_or_restart+0x2a/0x2b0
	exit_to_user_mode_prepare+0x94/0x100
	syscall_exit_to_user_mode+0x20/0x40
	do_syscall_64+0x52/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
	&lt;/TASK&gt;

 Allocated by task 4404:

	kasan_set_track+0x3d/0x60
	__kasan_kmalloc+0x85/0x90
	psi_trigger_create+0x113/0x3e0
	pressure_write+0x146/0x2e0
	cgroup_file_write+0x11c/0x250
	kernfs_fop_write_iter+0x186/0x220
	vfs_write+0x3d8/0x5c0
	ksys_write+0x90/0x110
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd

 Freed by task 4407:

	kasan_set_track+0x3d/0x60
	kasan_save_free_info+0x27/0x40
	____kasan_slab_free+0x11d/0x170
	slab_free_freelist_hook+0x87/0x150
	__kmem_cache_free+0xcb/0x180
	psi_trigger_destroy+0x2e8/0x310
	cgroup_file_release+0x4f/0xb0
	kernfs_drain_open_files+0x165/0x1f0
	kernfs_drain+0x162/0x1a0
	__kernfs_remove+0x1fb/0x310
	kernfs_remove_by_name_ns+0x95/0xe0
	cgroup_addrm_files+0x67f/0x700
	cgroup_destroy_locked+0x283/0x3c0
	cgroup_rmdir+0x29/0x100
	kernfs_iop_rmdir+0xd1/0x140
	vfs_rmdir+0xfe/0x240
	do_rmdir+0x13d/0x280
	__x64_sys_rmdir+0x2c/0x30
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52708</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52708" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmc_spi: fix error handling in mmc_spi_probe()

If mmc_add_host() fails, it doesn't need to call mmc_remove_host(),
or it will cause null-ptr-deref, because of deleting a not added
device in mmc_remove_host().

To fix this, goto label 'fail_glue_init', if mmc_add_host() fails,
and change the label 'fail_add_host' to 'fail_gpiod_request'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52730</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdio: fix possible resource leaks in some error paths

If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can
not release the resources, because the sdio function is not presented
in these two cases, it won't call of_node_put() or put_device().

To fix these leaks, make sdio_func_present() only control whether
device_del() needs to be called or not, then always call of_node_put()
and put_device().

In error case in sdio_init_func(), the reference of 'card-&gt;dev' is
not get, to avoid redundant put in sdio_free_func_cis(), move the
get_device() to sdio_alloc_func() and put_device() to sdio_release_func(),
it can keep the get/put function be balanced.

Without this patch, while doing fault inject test, it can get the
following leak reports, after this fix, the leak is gone.

unreferenced object 0xffff888112514000 (size 2048):
  comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s)
  hex dump (first 32 bytes):
    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......
    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....
  backtrace:
    [&lt;000000009e5931da&gt;] kmalloc_trace+0x21/0x110
    [&lt;000000002f839ccb&gt;] mmc_alloc_card+0x38/0xb0 [mmc_core]
    [&lt;0000000004adcbf6&gt;] mmc_sdio_init_card+0xde/0x170 [mmc_core]
    [&lt;000000007538fea0&gt;] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]
    [&lt;00000000d4fdeba7&gt;] mmc_rescan+0x54a/0x640 [mmc_core]

unreferenced object 0xffff888112511000 (size 2048):
  comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s)
  hex dump (first 32 bytes):
    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......
    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....
  backtrace:
    [&lt;000000009e5931da&gt;] kmalloc_trace+0x21/0x110
    [&lt;00000000fcbe706c&gt;] sdio_alloc_func+0x35/0x100 [mmc_core]
    [&lt;00000000c68f4b50&gt;] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]
    [&lt;00000000d4fdeba7&gt;] mmc_rescan+0x54a/0x640 [mmc_core]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52731</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52731" ref_url="https://www.suse.com/security/cve/CVE-2023-52731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix invalid page access after closing deferred I/O devices

When a fbdev with deferred I/O is once opened and closed, the dirty
pages still remain queued in the pageref list, and eventually later
those may be processed in the delayed work.  This may lead to a
corruption of pages, hitting an Oops.

This patch makes sure to cancel the delayed work and clean up the
pageref list at closing the device for addressing the bug.  A part of
the cleanup code is factored out as a new helper function that is
called from the common fb_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52731/">CVE-2023-52731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52731">CVE-2023-52731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224929">SUSE bug 1224929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52732</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52732" ref_url="https://www.suse.com/security/cve/CVE-2023-52732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: blocklist the kclient when receiving corrupted snap trace

When received corrupted snap trace we don't know what exactly has
happened in MDS side. And we shouldn't continue IOs and metadatas
access to MDS, which may corrupt or get incorrect contents.

This patch will just block all the further IO/MDS requests
immediately and then evict the kclient itself.

The reason why we still need to evict the kclient just after
blocking all the further IOs is that the MDS could revoke the caps
faster.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52732/">CVE-2023-52732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52732">CVE-2023-52732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225222">SUSE bug 1225222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/decompressor: specify __decompress() buf len to avoid overflow

Historically calls to __decompress() didn't specify "out_len" parameter
on many architectures including s390, expecting that no writes beyond
uncompressed kernel image are performed. This has changed since commit
2aa14b1ab2c4 ("zstd: import usptream v1.5.2") which includes zstd library
commit 6a7ede3dfccb ("Reduce size of dctx by reutilizing dst buffer
(#2751)"). Now zstd decompression code might store literal buffer in
the unwritten portion of the destination buffer. Since "out_len" is
not set, it is considered to be unlimited and hence free to use for
optimization needs. On s390 this might corrupt initrd or ipl report
which are often placed right after the decompressor buffer. Luckily the
size of uncompressed kernel image is already known to the decompressor,
so to avoid the problem simply specify it in the "out_len" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself

sock_map proto callbacks should never call themselves by design. Protect
against bugs like [1] and break out of the recursive loop to avoid a stack
overflow in favor of a resource leak.

[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52736</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52736" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Do not unset preset when cleaning up codec

Several functions that take part in codec's initialization and removal
are re-used by ASoC codec drivers implementations. Drivers mimic the
behavior of hda_codec_driver_probe/remove() found in
sound/pci/hda/hda_bind.c with their component-&gt;probe/remove() instead.

One of the reasons for that is the expectation of
snd_hda_codec_device_new() to receive a valid pointer to an instance of
struct snd_card. This expectation can be met only once sound card
components probing commences.

As ASoC sound card may be unbound without codec device being actually
removed from the system, unsetting -&gt;preset in
snd_hda_codec_cleanup_for_unbind() interferes with module unload -&gt; load
scenario causing null-ptr-deref. Preset is assigned only once, during
device/driver matching whereas ASoC codec driver's module reloading may
occur several times throughout the lifetime of an audio stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52737" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52737" ref_url="https://www.suse.com/security/cve/CVE-2023-52737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: lock the inode in shared mode before starting fiemap

Currently fiemap does not take the inode's lock (VFS lock), it only locks
a file range in the inode's io tree. This however can lead to a deadlock
if we have a concurrent fsync on the file and fiemap code triggers a fault
when accessing the user space buffer with fiemap_fill_next_extent(). The
deadlock happens on the inode's i_mmap_lock semaphore, which is taken both
by fsync and btrfs_page_mkwrite(). This deadlock was recently reported by
syzbot and triggers a trace like the following:

   task:syz-executor361 state:D stack:20264 pid:5668  ppid:5119   flags:0x00004004
   Call Trace:
    &lt;TASK&gt;
    context_switch kernel/sched/core.c:5293 [inline]
    __schedule+0x995/0xe20 kernel/sched/core.c:6606
    schedule+0xcb/0x190 kernel/sched/core.c:6682
    wait_on_state fs/btrfs/extent-io-tree.c:707 [inline]
    wait_extent_bit+0x577/0x6f0 fs/btrfs/extent-io-tree.c:751
    lock_extent+0x1c2/0x280 fs/btrfs/extent-io-tree.c:1742
    find_lock_delalloc_range+0x4e6/0x9c0 fs/btrfs/extent_io.c:488
    writepage_delalloc+0x1ef/0x540 fs/btrfs/extent_io.c:1863
    __extent_writepage+0x736/0x14e0 fs/btrfs/extent_io.c:2174
    extent_write_cache_pages+0x983/0x1220 fs/btrfs/extent_io.c:3091
    extent_writepages+0x219/0x540 fs/btrfs/extent_io.c:3211
    do_writepages+0x3c3/0x680 mm/page-writeback.c:2581
    filemap_fdatawrite_wbc+0x11e/0x170 mm/filemap.c:388
    __filemap_fdatawrite_range mm/filemap.c:421 [inline]
    filemap_fdatawrite_range+0x175/0x200 mm/filemap.c:439
    btrfs_fdatawrite_range fs/btrfs/file.c:3850 [inline]
    start_ordered_ops fs/btrfs/file.c:1737 [inline]
    btrfs_sync_file+0x4ff/0x1190 fs/btrfs/file.c:1839
    generic_write_sync include/linux/fs.h:2885 [inline]
    btrfs_do_write_iter+0xcd3/0x1280 fs/btrfs/file.c:1684
    call_write_iter include/linux/fs.h:2189 [inline]
    new_sync_write fs/read_write.c:491 [inline]
    vfs_write+0x7dc/0xc50 fs/read_write.c:584
    ksys_write+0x177/0x2a0 fs/read_write.c:637
    do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
    entry_SYSCALL_64_after_hwframe+0x63/0xcd
   RIP: 0033:0x7f7d4054e9b9
   RSP: 002b:00007f7d404fa2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
   RAX: ffffffffffffffda RBX: 00007f7d405d87a0 RCX: 00007f7d4054e9b9
   RDX: 0000000000000090 RSI: 0000000020000000 RDI: 0000000000000006
   RBP: 00007f7d405a51d0 R08: 0000000000000000 R09: 0000000000000000
   R10: 0000000000000000 R11: 0000000000000246 R12: 61635f65646f6e69
   R13: 65646f7475616f6e R14: 7261637369646f6e R15: 00007f7d405d87a8
    &lt;/TASK&gt;
   INFO: task syz-executor361:5697 blocked for more than 145 seconds.
         Not tainted 6.2.0-rc3-syzkaller-00376-g7c6984405241 #0
   "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
   task:syz-executor361 state:D stack:21216 pid:5697  ppid:5119   flags:0x00004004
   Call Trace:
    &lt;TASK&gt;
    context_switch kernel/sched/core.c:5293 [inline]
    __schedule+0x995/0xe20 kernel/sched/core.c:6606
    schedule+0xcb/0x190 kernel/sched/core.c:6682
    rwsem_down_read_slowpath+0x5f9/0x930 kernel/locking/rwsem.c:1095
    __down_read_common+0x54/0x2a0 kernel/locking/rwsem.c:1260
    btrfs_page_mkwrite+0x417/0xc80 fs/btrfs/inode.c:8526
    do_page_mkwrite+0x19e/0x5e0 mm/memory.c:2947
    wp_page_shared+0x15e/0x380 mm/memory.c:3295
    handle_pte_fault mm/memory.c:4949 [inline]
    __handle_mm_fault mm/memory.c:5073 [inline]
    handle_mm_fault+0x1b79/0x26b0 mm/memory.c:5219
    do_user_addr_fault+0x69b/0xcb0 arch/x86/mm/fault.c:1428
    handle_page_fault arch/x86/mm/fault.c:1519 [inline]
    exc_page_fault+0x7a/0x110 arch/x86/mm/fault.c:1575
    asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570
   RIP: 0010:copy_user_short_string+0xd/0x40 arch/x86/lib/copy_user_64.S:233
   Code: 74 0a 89 (...)
   RSP: 0018:ffffc9000570f330 EFLAGS: 000502
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52737/">CVE-2023-52737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52737">CVE-2023-52737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225484">SUSE bug 1225484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52738" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini

Currently amdgpu calls drm_sched_fini() from the fence driver sw fini
routine - such function is expected to be called only after the
respective init function - drm_sched_init() - was executed successfully.

Happens that we faced a driver probe failure in the Steam Deck
recently, and the function drm_sched_fini() was called even without
its counter-part had been previously called, causing the following oops:

amdgpu: probe of 0000:04:00.0 failed with error -110
BUG: kernel NULL pointer dereference, address: 0000000000000090
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 609 Comm: systemd-udevd Not tainted 6.2.0-rc3-gpiccoli #338
Hardware name: Valve Jupiter/Jupiter, BIOS F7A0113 11/04/2022
RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched]
[...]
Call Trace:
 &lt;TASK&gt;
 amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu]
 amdgpu_device_fini_sw+0x2b/0x3b0 [amdgpu]
 amdgpu_driver_release_kms+0x16/0x30 [amdgpu]
 devm_drm_dev_init_release+0x49/0x70
 [...]

To prevent that, check if the drm_sched was properly initialized for a
given ring before calling its fini counter-part.

Notice ideally we'd use sched.ready for that; such field is set as the latest
thing on drm_sched_init(). But amdgpu seems to "override" the meaning of such
field - in the above oops for example, it was a GFX ring causing the crash, and
the sched.ready field was set to true in the ring init routine, regardless of
the state of the DRM scheduler. Hence, we ended-up using sched.ops as per
Christian's suggestion [0], and also removed the no_scheduler check [1].

[0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/
[1] https://lore.kernel.org/amd-gfx/cd0e2994-f85f-d837-609f-7056d5fb7231@amd.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52739" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Fix page corruption caused by racy check in __free_pages

When we upgraded our kernel, we started seeing some page corruption like
the following consistently:

  BUG: Bad page state in process ganesha.nfsd  pfn:1304ca
  page:0000000022261c55 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1304ca
  flags: 0x17ffffc0000000()
  raw: 0017ffffc0000000 ffff8a513ffd4c98 ffffeee24b35ec08 0000000000000000
  raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000
  page dumped because: nonzero mapcount
  CPU: 0 PID: 15567 Comm: ganesha.nfsd Kdump: loaded Tainted: P    B      O      5.10.158-1.nutanix.20221209.el7.x86_64 #1
  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
  Call Trace:
   dump_stack+0x74/0x96
   bad_page.cold+0x63/0x94
   check_new_page_bad+0x6d/0x80
   rmqueue+0x46e/0x970
   get_page_from_freelist+0xcb/0x3f0
   ? _cond_resched+0x19/0x40
   __alloc_pages_nodemask+0x164/0x300
   alloc_pages_current+0x87/0xf0
   skb_page_frag_refill+0x84/0x110
   ...

Sometimes, it would also show up as corruption in the free list pointer
and cause crashes.

After bisecting the issue, we found the issue started from commit
e320d3012d25 ("mm/page_alloc.c: fix freeing non-compound pages"):

	if (put_page_testzero(page))
		free_the_page(page, order);
	else if (!PageHead(page))
		while (order-- &gt; 0)
			free_the_page(page + (1 &lt;&lt; order), order);

So the problem is the check PageHead is racy because at this point we
already dropped our reference to the page.  So even if we came in with
compound page, the page can already be freed and PageHead can return
false and we will end up freeing all the tail pages causing double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225119">SUSE bug 1225119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52740</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52740" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch

The RFI and STF security mitigation options can flip the
interrupt_exit_not_reentrant static branch condition concurrently with
the interrupt exit code which tests that branch.

Interrupt exit tests this condition to set MSR[EE|RI] for exit, then
again in the case a soft-masked interrupt is found pending, to recover
the MSR so the interrupt can be replayed before attempting to exit
again. If the condition changes between these two tests, the MSR and irq
soft-mask state will become corrupted, leading to warnings and possible
crashes. For example, if the branch is initially true then false,
MSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear and EE may not get
enabled, leading to warnings in irq_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52741" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix use-after-free in rdata-&gt;read_into_pages()

When the network status is unstable, use-after-free may occur when
read data from the server.

  BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0

  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x38/0x4c
   print_report+0x16f/0x4a6
   kasan_report+0xb7/0x130
   readpages_fill_pages+0x14c/0x7e0
   cifs_readv_receive+0x46d/0xa40
   cifs_demultiplex_thread+0x121c/0x1490
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50
   &lt;/TASK&gt;

  Allocated by task 2535:
   kasan_save_stack+0x22/0x50
   kasan_set_track+0x25/0x30
   __kasan_kmalloc+0x82/0x90
   cifs_readdata_direct_alloc+0x2c/0x110
   cifs_readdata_alloc+0x2d/0x60
   cifs_readahead+0x393/0xfe0
   read_pages+0x12f/0x470
   page_cache_ra_unbounded+0x1b1/0x240
   filemap_get_pages+0x1c8/0x9a0
   filemap_read+0x1c0/0x540
   cifs_strict_readv+0x21b/0x240
   vfs_read+0x395/0x4b0
   ksys_read+0xb8/0x150
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

  Freed by task 79:
   kasan_save_stack+0x22/0x50
   kasan_set_track+0x25/0x30
   kasan_save_free_info+0x2e/0x50
   __kasan_slab_free+0x10e/0x1a0
   __kmem_cache_free+0x7a/0x1a0
   cifs_readdata_release+0x49/0x60
   process_one_work+0x46c/0x760
   worker_thread+0x2a4/0x6f0
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50

  Last potentially related work creation:
   kasan_save_stack+0x22/0x50
   __kasan_record_aux_stack+0x95/0xb0
   insert_work+0x2b/0x130
   __queue_work+0x1fe/0x660
   queue_work_on+0x4b/0x60
   smb2_readv_callback+0x396/0x800
   cifs_abort_connection+0x474/0x6a0
   cifs_reconnect+0x5cb/0xa50
   cifs_readv_from_socket.cold+0x22/0x6c
   cifs_read_page_from_socket+0xc1/0x100
   readpages_fill_pages.cold+0x2f/0x46
   cifs_readv_receive+0x46d/0xa40
   cifs_demultiplex_thread+0x121c/0x1490
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50

The following function calls will cause UAF of the rdata pointer.

readpages_fill_pages
 cifs_read_page_from_socket
  cifs_readv_from_socket
   cifs_reconnect
    __cifs_reconnect
     cifs_abort_connection
      mid-&gt;callback() --&gt; smb2_readv_callback
       queue_work(&amp;rdata-&gt;work)  # if the worker completes first,
                                 # the rdata is freed
          cifs_readv_complete
            kref_put
              cifs_readdata_release
                kfree(rdata)
 return rdata-&gt;...               # UAF in readpages_fill_pages()

Similarly, this problem also occurs in the uncache_fill_pages().

Fix this by adjusts the order of condition judgment in the return
statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52742" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: USB: Fix wrong-direction WARNING in plusb.c

The syzbot fuzzer detected a bug in the plusb network driver: A
zero-length control-OUT transfer was treated as a read instead of a
write.  In modern kernels this error provokes a WARNING:

usb 1-1: BOGUS control dir, pipe 80000280 doesn't match bRequestType c0
WARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411
usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
Modules linked in:
CPU: 1 PID: 4645 Comm: dhcpcd Not tainted
6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
01/12/2023
RIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
...
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58
 usb_internal_control_msg drivers/usb/core/message.c:102 [inline]
 usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153
 __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010
 usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068
 pl_vendor_req drivers/net/usb/plusb.c:60 [inline]
 pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]
 pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85
 usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889
 __dev_open+0x297/0x4d0 net/core/dev.c:1417
 __dev_change_flags+0x587/0x750 net/core/dev.c:8530
 dev_change_flags+0x97/0x170 net/core/dev.c:8602
 devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147
 inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979
 sock_do_ioctl+0xcc/0x230 net/socket.c:1169
 sock_ioctl+0x1f8/0x680 net/socket.c:1286
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and
remove the USB_DIR_IN flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Do not use WQ_MEM_RECLAIM flag for workqueue

When both ice and the irdma driver are loaded, a warning in
check_flush_dependency is being triggered. This is due to ice driver
workqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one
is not.

According to kernel documentation, this flag should be set if the
workqueue will be involved in the kernel's memory reclamation flow.
Since it is not, there is no need for the ice driver's WQ to have this
flag set so remove it.

Example trace:

[  +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0
[  +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha
in_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel
_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1
0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_
core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs
ib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter
acpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba
ta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
[  +0.000161]  [last unloaded: bonding]
[  +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S                 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1
[  +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  +0.000003] Workqueue: ice ice_service_task [ice]
[  +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0
[  +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08
9f e8 bb d3 07 01 &lt;0f&gt; 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06
[  +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282
[  +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000
[  +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80
[  +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112
[  +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000
[  +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400
[  +0.000004] FS:  0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000
[  +0.000003] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0
[  +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  +0.000002] PKRU: 55555554
[  +0.000003] Call Trace:
[  +0.000002]  &lt;TASK&gt;
[  +0.000003]  __flush_workqueue+0x203/0x840
[  +0.000006]  ? mutex_unlock+0x84/0xd0
[  +0.000008]  ? __pfx_mutex_unlock+0x10/0x10
[  +0.000004]  ? __pfx___flush_workqueue+0x10/0x10
[  +0.000006]  ? mutex_lock+0xa3/0xf0
[  +0.000005]  ib_cache_cleanup_one+0x39/0x190 [ib_core]
[  +0.000174]  __ib_unregister_device+0x84/0xf0 [ib_core]
[  +0.000094]  ib_unregister_device+0x25/0x30 [ib_core]
[  +0.000093]  irdma_ib_unregister_device+0x97/0xc0 [irdma]
[  +0.000064]  ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]
[  +0.000059]  ? up_write+0x5c/0x90
[  +0.000005]  irdma_remove+0x36/0x90 [irdma]
[  +0.000062]  auxiliary_bus_remove+0x32/0x50
[  +0.000007]  device_r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52744" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix potential NULL-ptr-dereference

in_dev_get() can return NULL which will cause a failure once idev is
dereferenced in in_dev_for_each_ifa_rtnl(). This patch adds a
check for NULL value in idev beforehand.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/IPoIB: Fix legacy IPoIB due to wrong number of queues

The cited commit creates child PKEY interfaces over netlink will
multiple tx and rx queues, but some devices doesn't support more than 1
tx and 1 rx queues. This causes to a crash when traffic is sent over the
PKEY interface due to the parent having a single queue but the child
having multiple queues.

This patch fixes the number of queues to 1 for legacy IPoIB at the
earliest possible point in time.

BUG: kernel NULL pointer dereference, address: 000000000000036b
PGD 0 P4D 0
Oops: 0000 [#1] SMP
CPU: 4 PID: 209665 Comm: python3 Not tainted 6.1.0_for_upstream_min_debug_2022_12_12_17_02 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:kmem_cache_alloc+0xcb/0x450
Code: ce 7e 49 8b 50 08 49 83 78 10 00 4d 8b 28 0f 84 cb 02 00 00 4d 85 ed 0f 84 c2 02 00 00 41 8b 44 24 28 48 8d 4a
01 49 8b 3c 24 &lt;49&gt; 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 74 b8 41 8b
RSP: 0018:ffff88822acbbab8 EFLAGS: 00010202
RAX: 0000000000000070 RBX: ffff8881c28e3e00 RCX: 00000000064f8dae
RDX: 00000000064f8dad RSI: 0000000000000a20 RDI: 0000000000030d00
RBP: 0000000000000a20 R08: ffff8882f5d30d00 R09: ffff888104032f40
R10: ffff88810fade828 R11: 736f6d6570736575 R12: ffff88810081c000
R13: 00000000000002fb R14: ffffffff817fc865 R15: 0000000000000000
FS:  00007f9324ff9700(0000) GS:ffff8882f5d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000036b CR3: 00000001125af004 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 skb_clone+0x55/0xd0
 ip6_finish_output2+0x3fe/0x690
 ip6_finish_output+0xfa/0x310
 ip6_send_skb+0x1e/0x60
 udp_v6_send_skb+0x1e5/0x420
 udpv6_sendmsg+0xb3c/0xe60
 ? ip_mc_finish_output+0x180/0x180
 ? __switch_to_asm+0x3a/0x60
 ? __switch_to_asm+0x34/0x60
 sock_sendmsg+0x33/0x40
 __sys_sendto+0x103/0x160
 ? _copy_to_user+0x21/0x30
 ? kvm_clock_get_cycles+0xd/0x10
 ? ktime_get_ts64+0x49/0xe0
 __x64_sys_sendto+0x25/0x30
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f9374f1ed14
Code: 42 41 f8 ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b
7c 24 08 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 68 41 f8 ff 48 8b
RSP: 002b:00007f9324ff7bd0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f9324ff7cc8 RCX: 00007f9374f1ed14
RDX: 00000000000002fb RSI: 00007f93000052f0 RDI: 0000000000000030
RBP: 0000000000000000 R08: 00007f9324ff7d40 R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 000000012a05f200 R14: 0000000000000001 R15: 00007f9374d57bdc
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52746" ref_url="https://www.suse.com/security/cve/CVE-2023-52746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()

  int type = nla_type(nla);

  if (type &gt; XFRMA_MAX) {
            return -EOPNOTSUPP;
  }

@type is then used as an array index and can be used
as a Spectre v1 gadget.

  if (nla_len(nla) &lt; compat_policy[type].len) {

array_index_nospec() can be used to prevent leaking
content of kernel memory to malicious users.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52746/">CVE-2023-52746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52746">CVE-2023-52746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225114">SUSE bug 1225114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52747" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Restore allocated resources on failed copyout

Fix a resource leak if an error occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52751</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52751" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in smb2_query_info_compound()

The following UAF was triggered when running fstests generic/072 with
KASAN enabled against Windows Server 2022 and mount options
'multichannel,max_channels=2,vers=3.1.1,mfsymlinks,noperm'

  BUG: KASAN: slab-use-after-free in smb2_query_info_compound+0x423/0x6d0 [cifs]
  Read of size 8 at addr ffff888014941048 by task xfs_io/27534

  CPU: 0 PID: 27534 Comm: xfs_io Not tainted 6.6.0-rc7 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
  Call Trace:
   dump_stack_lvl+0x4a/0x80
   print_report+0xcf/0x650
   ? srso_alias_return_thunk+0x5/0x7f
   ? srso_alias_return_thunk+0x5/0x7f
   ? __phys_addr+0x46/0x90
   kasan_report+0xda/0x110
   ? smb2_query_info_compound+0x423/0x6d0 [cifs]
   ? smb2_query_info_compound+0x423/0x6d0 [cifs]
   smb2_query_info_compound+0x423/0x6d0 [cifs]
   ? __pfx_smb2_query_info_compound+0x10/0x10 [cifs]
   ? srso_alias_return_thunk+0x5/0x7f
   ? __stack_depot_save+0x39/0x480
   ? kasan_save_stack+0x33/0x60
   ? kasan_set_track+0x25/0x30
   ? ____kasan_slab_free+0x126/0x170
   smb2_queryfs+0xc2/0x2c0 [cifs]
   ? __pfx_smb2_queryfs+0x10/0x10 [cifs]
   ? __pfx___lock_acquire+0x10/0x10
   smb311_queryfs+0x210/0x220 [cifs]
   ? __pfx_smb311_queryfs+0x10/0x10 [cifs]
   ? srso_alias_return_thunk+0x5/0x7f
   ? __lock_acquire+0x480/0x26c0
   ? lock_release+0x1ed/0x640
   ? srso_alias_return_thunk+0x5/0x7f
   ? do_raw_spin_unlock+0x9b/0x100
   cifs_statfs+0x18c/0x4b0 [cifs]
   statfs_by_dentry+0x9b/0xf0
   fd_statfs+0x4e/0xb0
   __do_sys_fstatfs+0x7f/0xe0
   ? __pfx___do_sys_fstatfs+0x10/0x10
   ? srso_alias_return_thunk+0x5/0x7f
   ? lockdep_hardirqs_on_prepare+0x136/0x200
   ? srso_alias_return_thunk+0x5/0x7f
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8

  Allocated by task 27534:
   kasan_save_stack+0x33/0x60
   kasan_set_track+0x25/0x30
   __kasan_kmalloc+0x8f/0xa0
   open_cached_dir+0x71b/0x1240 [cifs]
   smb2_query_info_compound+0x5c3/0x6d0 [cifs]
   smb2_queryfs+0xc2/0x2c0 [cifs]
   smb311_queryfs+0x210/0x220 [cifs]
   cifs_statfs+0x18c/0x4b0 [cifs]
   statfs_by_dentry+0x9b/0xf0
   fd_statfs+0x4e/0xb0
   __do_sys_fstatfs+0x7f/0xe0
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8

  Freed by task 27534:
   kasan_save_stack+0x33/0x60
   kasan_set_track+0x25/0x30
   kasan_save_free_info+0x2b/0x50
   ____kasan_slab_free+0x126/0x170
   slab_free_freelist_hook+0xd0/0x1e0
   __kmem_cache_free+0x9d/0x1b0
   open_cached_dir+0xff5/0x1240 [cifs]
   smb2_query_info_compound+0x5c3/0x6d0 [cifs]
   smb2_queryfs+0xc2/0x2c0 [cifs]

This is a race between open_cached_dir() and cached_dir_lease_break()
where the cache entry for the open directory handle receives a lease
break while creating it.  And before returning from open_cached_dir(),
we put the last reference of the new @cfid because of
!@cfid-&gt;has_lease.

Besides the UAF, while running xfstests a lot of missed lease breaks
have been noticed in tests that run several concurrent statfs(2) calls
on those cached fids

  CIFS: VFS: \\w22-root1.gandalf.test No task to wake, unknown frame...
  CIFS: VFS: \\w22-root1.gandalf.test Cmd: 18 Err: 0x0 Flags: 0x1...
  CIFS: VFS: \\w22-root1.gandalf.test smb buf 00000000715bfe83 len 108
  CIFS: VFS: Dump pending requests:
  CIFS: VFS: \\w22-root1.gandalf.test No task to wake, unknown frame...
  CIFS: VFS: \\w22-root1.gandalf.test Cmd: 18 Err: 0x0 Flags: 0x1...
  CIFS: VFS: \\w22-root1.gandalf.test smb buf 000000005aa7316e len 108
  ...

To fix both, in open_cached_dir() ensure that @cfid-&gt;has_lease is set
right before sending out compounded request so that any potential
lease break will be get processed by demultiplex thread while we're
still caching @cfid.  And, if open failed for some reason, re-check
@cfid-&gt;has_lease to decide whether or not put lease reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225489">SUSE bug 1225489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52752</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free bug in cifs_debug_data_proc_show()

Skip SMB sessions that are being teared down
(e.g. @ses-&gt;ses_status == SES_EXITING) in cifs_debug_data_proc_show()
to avoid use-after-free in @ses.

This fixes the following GPF when reading from /proc/fs/cifs/DebugData
while mounting and umounting

  [ 816.251274] general protection fault, probably for non-canonical
  address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI
  ...
  [  816.260138] Call Trace:
  [  816.260329]  &lt;TASK&gt;
  [  816.260499]  ? die_addr+0x36/0x90
  [  816.260762]  ? exc_general_protection+0x1b3/0x410
  [  816.261126]  ? asm_exc_general_protection+0x26/0x30
  [  816.261502]  ? cifs_debug_tcon+0xbd/0x240 [cifs]
  [  816.261878]  ? cifs_debug_tcon+0xab/0x240 [cifs]
  [  816.262249]  cifs_debug_data_proc_show+0x516/0xdb0 [cifs]
  [  816.262689]  ? seq_read_iter+0x379/0x470
  [  816.262995]  seq_read_iter+0x118/0x470
  [  816.263291]  proc_reg_read_iter+0x53/0x90
  [  816.263596]  ? srso_alias_return_thunk+0x5/0x7f
  [  816.263945]  vfs_read+0x201/0x350
  [  816.264211]  ksys_read+0x75/0x100
  [  816.264472]  do_syscall_64+0x3f/0x90
  [  816.264750]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
  [  816.265135] RIP: 0033:0x7fd5e669d381
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225819">SUSE bug 1225819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid NULL dereference of timing generator

[Why &amp; How]
Check whether assigned timing generator is NULL or not before
accessing its funcs to prevent NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52754" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imon: fix access to invalid resource for the second interface

imon driver probes two USB interfaces, and at the probe of the second
interface, the driver assumes blindly that the first interface got
bound with the same imon driver.  It's usually true, but it's still
possible that the first interface is bound with another driver via a
malformed descriptor.  Then it may lead to a memory corruption, as
spotted by syzkaller; imon driver accesses the data from drvdata as
struct imon_context object although it's a completely different one
that was assigned by another driver.

This patch adds a sanity check -- whether the first interface is
really bound with the imon driver or not -- for avoiding the problem
above at the probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52756</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52757</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52757" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential deadlock when releasing mids

All release_mid() callers seem to hold a reference of @mid so there is
no need to call kref_put(&amp;mid-&gt;refcount, __release_mid) under
@server-&gt;mid_lock spinlock.  If they don't, then an use-after-free bug
would have occurred anyways.

By getting rid of such spinlock also fixes a potential deadlock as
shown below

CPU 0                                CPU 1
------------------------------------------------------------------
cifs_demultiplex_thread()            cifs_debug_data_proc_show()
 release_mid()
  spin_lock(&amp;server-&gt;mid_lock);
                                     spin_lock(&amp;cifs_tcp_ses_lock)
				      spin_lock(&amp;server-&gt;mid_lock)
  __release_mid()
   smb2_find_smb_tcon()
    spin_lock(&amp;cifs_tcp_ses_lock) *deadlock*
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225548">SUSE bug 1225548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52759</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52759" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52762</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52762" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-blk: fix implicit overflow on virtio_max_dma_size

The following codes have an implicit conversion from size_t to u32:
(u32)max_size = (size_t)virtio_max_dma_size(vdev);

This may lead overflow, Ex (size_t)4G -&gt; (u32)0. Once
virtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX
instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52763</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52763" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.

The `i3c_master_bus_init` function may attach the I2C devices before the
I3C bus initialization. In this flow, the DAT `alloc_entry`` will be used
before the DAT `init`. Additionally, if the `i3c_master_bus_init` fails,
the DAT `cleanup` will execute before the device is detached, which will
execue DAT `free_entry` function. The above scenario can cause the driver
to use DAT_data when it is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52764</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52764" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: gspca: cpia1: shift-out-of-bounds in set_flicker

Syzkaller reported the following issue:
UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27
shift exponent 245 is too large for 32-bit type 'int'

When the value of the variable "sd-&gt;params.exposure.gain" exceeds the
number of bits in an integer, a shift-out-of-bounds error is reported. It
is triggered because the variable "currentexp" cannot be left-shifted by
more than the number of bits in an integer. In order to avoid invalid
range during left-shift, the conditional expression is added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler

Do not loop over ring headers in hci_dma_irq_handler() that are not
allocated and enabled in hci_dma_init(). Otherwise out of bounds access
will occur from rings-&gt;headers[i] access when i &gt;= number of allocated
ring headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52773</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52773" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()

When ddc_service_construct() is called, it explicitly checks both the
link type and whether there is something on the link which will
dictate whether the pin is marked as hw_supported.

If the pin isn't set or the link is not set (such as from
unloading/reloading amdgpu in an IGT test) then fail the
amdgpu_dm_i2c_xfer() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225041">SUSE bug 1225041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52774</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52774" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: protect device queue against concurrent access

In dasd_profile_start() the amount of requests on the device queue are
counted. The access to the device queue is unprotected against
concurrent access. With a lot of parallel I/O, especially with alias
devices enabled, the device queue can change while dasd_profile_start()
is accessing the queue. In the worst case this leads to a kernel panic
due to incorrect pointer accesses.

Fix this by taking the device lock before accessing the queue and
counting the requests. Additionally the check for a valid profile data
pointer can be done earlier to avoid unnecessary locking in a hot path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: avoid data corruption caused by decline

We found a data corruption issue during testing of SMC-R on Redis
applications.

The benchmark has a low probability of reporting a strange error as
shown below.

"Error: Protocol error, got "\xe2" as reply type byte"

Finally, we found that the retrieved error data was as follows:

0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C
0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00
0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2

It is quite obvious that this is a SMC DECLINE message, which means that
the applications received SMC protocol message.
We found that this was caused by the following situations:

client                  server
        |  clc proposal
        -------------&gt;
        |  clc accept
        &lt;-------------
        |  clc confirm
        -------------&gt;
wait llc confirm
			send llc confirm
        |failed llc confirm
        |   x------
(after 2s)timeout
                        wait llc confirm rsp

wait decline

(after 1s) timeout
                        (after 2s) timeout
        |   decline
        --------------&gt;
        |   decline
        &lt;--------------

As a result, a decline message was sent in the implementation, and this
message was read from TCP by the already-fallback connection.

This patch double the client timeout as 2x of the server value,
With this simple change, the Decline messages should never cross or
collide (during Confirm link timeout).

This issue requires an immediate solution, since the protocol updates
involve a more long-term solution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225088">SUSE bug 1225088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52777</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52777" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix gtk offload status event locking

The ath11k active pdevs are protected by RCU but the gtk offload status
event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not
marked as a read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224992">SUSE bug 1224992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52781</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: config: fix iteration issue in 'usb_get_bos_descriptor()'

The BOS descriptor defines a root descriptor and is the base descriptor for
accessing a family of related descriptors.

Function 'usb_get_bos_descriptor()' encounters an iteration issue when
skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in
the same descriptor being read repeatedly.

To address this issue, a 'goto' statement is introduced to ensure that the
pointer and the amount read is updated correctly. This ensures that the
function iterates to the next descriptor instead of reading the same
descriptor repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52784</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52784" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: stop the device in bond_setup_by_slave()

Commit 9eed321cde22 ("net: lapbether: only support ethernet devices")
has been able to keep syzbot away from net/lapb, until today.

In the following splat [1], the issue is that a lapbether device has
been created on a bonding device without members. Then adding a non
ARPHRD_ETHER member forced the bonding master to change its type.

The fix is to make sure we call dev_close() in bond_setup_by_slave()
so that the potential linked lapbether devices (or any other devices
having assumptions on the physical device) are removed.

A similar bug has been addressed in commit 40baec225765
("bonding: fix panic on non-ARPHRD_ETHER enslave failure")

[1]
skbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0
kernel BUG at net/core/skbuff.c:192 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : skb_panic net/core/skbuff.c:188 [inline]
pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
lr : skb_panic net/core/skbuff.c:188 [inline]
lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
sp : ffff800096a06aa0
x29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000
x26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea
x23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140
x20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100
x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001
x14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00
x8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c
x2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086
Call trace:
skb_panic net/core/skbuff.c:188 [inline]
skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
skb_push+0xf0/0x108 net/core/skbuff.c:2446
ip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384
dev_hard_header include/linux/netdevice.h:3136 [inline]
lapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257
lapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447
lapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149
lapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251
__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326
lapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
lapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
bond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332
bond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539
dev_ifsioc+0x754/0x9ac
dev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786
sock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217
sock_ioctl+0x4e8/0x834 net/socket.c:1322
vfs_ioctl fs/ioctl.c:51 [inline]
__do_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224946">SUSE bug 1224946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52787</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52787" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: make sure active queue usage is held for bio_integrity_prep()

blk_integrity_unregister() can come if queue usage counter isn't held
for one bio with integrity prepared, so this request may be completed with
calling profile-&gt;complete_fn, then kernel panic.

Another constraint is that bio_integrity_prep() needs to be called
before bio merge.

Fix the issue by:

- call bio_integrity_prep() with one queue usage counter grabbed reliably

- call bio_integrity_prep() before bio merge
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225105">SUSE bug 1225105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i915/perf: Fix NULL deref bugs with drm_dbg() calls

When i915 perf interface is not available dereferencing it will lead to
NULL dereferences.

As returning -ENOTSUPP is pretty clear return when perf interface is not
available.

[tursulin: added stable tag]
(cherry picked from commit 36f27350ff745bd228ab04d7845dfbffc177a889)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52789</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52789" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: vcc: Add check for kstrdup() in vcc_probe()

Add check for the return value of kstrdup() and return the error, if it
fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52791</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52791" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: core: Run atomic i2c xfer when !preemptible

Since bae1d3a05a8b, i2c transfers are non-atomic if preemption is
disabled. However, non-atomic i2c transfers require preemption (e.g. in
wait_for_completion() while waiting for the DMA).

panic() calls preempt_disable_notrace() before calling
emergency_restart(). Therefore, if an i2c device is used for the
restart, the xfer should be atomic. This avoids warnings like:

[   12.667612] WARNING: CPU: 1 PID: 1 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x33c/0x6b0
[   12.676926] Voluntary context switch within RCU read-side critical section!
...
[   12.742376]  schedule_timeout from wait_for_completion_timeout+0x90/0x114
[   12.749179]  wait_for_completion_timeout from tegra_i2c_wait_completion+0x40/0x70
...
[   12.994527]  atomic_notifier_call_chain from machine_restart+0x34/0x58
[   13.001050]  machine_restart from panic+0x2a8/0x32c

Use !preemptible() instead, which is basically the same check as
pre-v5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52795</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost-vdpa: fix use after free in vhost_vdpa_probe()

The put_device() calls vhost_vdpa_release_dev() which calls
ida_simple_remove() and frees "v".  So this call to
ida_simple_remove() is a use after free and a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225085">SUSE bug 1225085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52796</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52796" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: add ipvlan_route_v6_outbound() helper

Inspired by syzbot reports using a stack of multiple ipvlan devices.

Reduce stack size needed in ipvlan_process_v6_outbound() by moving
the flowi6 struct used for the route lookup in an non inlined
helper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,
immediately reclaimed.

Also make sure ipvlan_process_v4_outbound() is not inlined.

We might also have to lower MAX_NEST_DEV, because only syzbot uses
setups with more than four stacked devices.

BUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)
stack guard page: 0000 [#1] SMP KASAN
CPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
RIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188
Code: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 &lt;41&gt; 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89
RSP: 0018:ffffc9000e804000 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568
RBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c
R13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000
FS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;#DF&gt;
&lt;/#DF&gt;
&lt;TASK&gt;
[&lt;ffffffff81f281d1&gt;] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31
[&lt;ffffffff817e5bf2&gt;] instrument_atomic_read include/linux/instrumented.h:72 [inline]
[&lt;ffffffff817e5bf2&gt;] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
[&lt;ffffffff817e5bf2&gt;] cpumask_test_cpu include/linux/cpumask.h:506 [inline]
[&lt;ffffffff817e5bf2&gt;] cpu_online include/linux/cpumask.h:1092 [inline]
[&lt;ffffffff817e5bf2&gt;] trace_lock_acquire include/trace/events/lock.h:24 [inline]
[&lt;ffffffff817e5bf2&gt;] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632
[&lt;ffffffff8563221e&gt;] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306
[&lt;ffffffff8561464d&gt;] rcu_read_lock include/linux/rcupdate.h:747 [inline]
[&lt;ffffffff8561464d&gt;] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221
[&lt;ffffffff85618120&gt;] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606
[&lt;ffffffff856f65b5&gt;] pol_lookup_func include/net/ip6_fib.h:584 [inline]
[&lt;ffffffff856f65b5&gt;] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116
[&lt;ffffffff85618009&gt;] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638
[&lt;ffffffff8561821a&gt;] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651
[&lt;ffffffff838bd5a3&gt;] ip6_route_output include/net/ip6_route.h:100 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677
[&lt;ffffffff838c2909&gt;] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229
[&lt;ffffffff84d03900&gt;] netdev_start_xmit include/linux/netdevice.h:4966 [inline]
[&lt;ffffffff84d03900&gt;] xmit_one net/core/dev.c:3644 [inline]
[&lt;ffffffff84d03900&gt;] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660
[&lt;ffffffff84d080e2&gt;] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324
[&lt;ffffffff855ce4cd&gt;] dev_queue_xmit include/linux/netdevice.h:3067 [inline]
[&lt;ffffffff855ce4cd&gt;] neigh_hh_output include/net/neighbour.h:529 [inline]
[&lt;f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224930">SUSE bug 1224930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52798" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix dfs radar event locking

The ath11k active pdevs are protected by RCU but the DFS radar event
handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52799</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in dbFindLeaf

Currently while searching for dmtree_t for sufficient free blocks there
is an array out of bounds while getting element in tp-&gt;dm_stree. To add
the required check for out of bound we first need to determine the type
of dmtree. Thus added an extra parameter to dbFindLeaf so that the type
of tree can be determined and the required check can be applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52800</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix htt pktlog locking

The ath11k active pdevs are protected by RCU but the htt pktlog handling
code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52803</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix RPC client cleaned up the freed pipefs dentries

RPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()
workqueue,which takes care about pipefs superblock locking.
In some special scenarios, when kernel frees the pipefs sb of the
current client and immediately alloctes a new pipefs sb,
rpc_remove_pipedir function would misjudge the existence of pipefs
sb which is not the one it used to hold. As a result,
the rpc_remove_pipedir would clean the released freed pipefs dentries.

To fix this issue, rpc_remove_pipedir should check whether the
current pipefs sb is consistent with the original pipefs sb.

This error can be catched by KASAN:
=========================================================
[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200
[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503
[  250.500549] Workqueue: events rpc_free_client_work
[  250.501001] Call Trace:
[  250.502880]  kasan_report+0xb6/0xf0
[  250.503209]  ? dget_parent+0x195/0x200
[  250.503561]  dget_parent+0x195/0x200
[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10
[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90
[  250.504781]  rpc_remove_client_dir+0xf5/0x150
[  250.505195]  rpc_free_client_work+0xe4/0x230
[  250.505598]  process_one_work+0x8ee/0x13b0
...
[   22.039056] Allocated by task 244:
[   22.039390]  kasan_save_stack+0x22/0x50
[   22.039758]  kasan_set_track+0x25/0x30
[   22.040109]  __kasan_slab_alloc+0x59/0x70
[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240
[   22.040889]  __d_alloc+0x31/0x8e0
[   22.041207]  d_alloc+0x44/0x1f0
[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140
[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110
[   22.042459]  rpc_create_client_dir+0x34/0x150
[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0
[   22.043284]  rpc_client_register+0x136/0x4e0
[   22.043689]  rpc_new_client+0x911/0x1020
[   22.044057]  rpc_create_xprt+0xcb/0x370
[   22.044417]  rpc_create+0x36b/0x6c0
...
[   22.049524] Freed by task 0:
[   22.049803]  kasan_save_stack+0x22/0x50
[   22.050165]  kasan_set_track+0x25/0x30
[   22.050520]  kasan_save_free_info+0x2b/0x50
[   22.050921]  __kasan_slab_free+0x10e/0x1a0
[   22.051306]  kmem_cache_free+0xa5/0x390
[   22.051667]  rcu_core+0x62c/0x1930
[   22.051995]  __do_softirq+0x165/0x52a
[   22.052347]
[   22.052503] Last potentially related work creation:
[   22.052952]  kasan_save_stack+0x22/0x50
[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0
[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0
[   22.054209]  dentry_free+0xb2/0x140
[   22.054540]  __dentry_kill+0x3be/0x540
[   22.054900]  shrink_dentry_list+0x199/0x510
[   22.055293]  shrink_dcache_parent+0x190/0x240
[   22.055703]  do_one_tree+0x11/0x40
[   22.056028]  shrink_dcache_for_umount+0x61/0x140
[   22.056461]  generic_shutdown_super+0x70/0x590
[   22.056879]  kill_anon_super+0x3a/0x60
[   22.057234]  rpc_kill_sb+0x121/0x200
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225008">SUSE bug 1225008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Add validity check for db_maxag and db_agpref

Both db_maxag and db_agpref are used as the index of the
db_agfree array, but there is currently no validity check for
db_maxag and db_agpref, which can lead to errors.

The following is related bug reported by Syzbot:

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20
index 7936 is out of range for type 'atomic_t[128]'

Add checking that the values of db_maxag and db_agpref are valid
indexes for the db_agfree array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52805</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52805" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in diAlloc

Currently there is not check against the agno of the iag while
allocating new inodes to avoid fragmentation problem. Added the check
which is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52806</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52806" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix possible null-ptr-deref when assigning a stream

While AudioDSP drivers assign streams exclusively of HOST or LINK type,
nothing blocks a user to attempt to assign a COUPLED stream. As
supplied substream instance may be a stub, what is the case when
code-loading, such scenario ends with null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52807</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52807" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs

The hns3 driver define an array of string to show the coalesce
info, but if the kernel adds a new mode or a new state,
out-of-bounds access may occur when coalesce info is read via
debugfs, this patch fix the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225097">SUSE bug 1225097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52808</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52808" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs

If init debugfs failed during device registration due to memory allocation
failure, debugfs_remove_recursive() is called, after which debugfs_dir is
not set to NULL. debugfs_remove_recursive() will be called again during
device removal. As a result, illegal pointer is accessed.

[ 1665.467244] hisi_sas_v3_hw 0000:b4:02.0: failed to init debugfs!
...
[ 1669.836708] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[ 1669.872669] pc : down_write+0x24/0x70
[ 1669.876315] lr : down_write+0x1c/0x70
[ 1669.879961] sp : ffff000036f53a30
[ 1669.883260] x29: ffff000036f53a30 x28: ffffa027c31549f8
[ 1669.888547] x27: ffffa027c3140000 x26: 0000000000000000
[ 1669.893834] x25: ffffa027bf37c270 x24: ffffa027bf37c270
[ 1669.899122] x23: ffff0000095406b8 x22: ffff0000095406a8
[ 1669.904408] x21: 0000000000000000 x20: ffffa027bf37c310
[ 1669.909695] x19: 00000000000000a0 x18: ffff8027dcd86f10
[ 1669.914982] x17: 0000000000000000 x16: 0000000000000000
[ 1669.920268] x15: 0000000000000000 x14: ffffa0274014f870
[ 1669.925555] x13: 0000000000000040 x12: 0000000000000228
[ 1669.930842] x11: 0000000000000020 x10: 0000000000000bb0
[ 1669.936129] x9 : ffff000036f537f0 x8 : ffff80273088ca10
[ 1669.941416] x7 : 000000000000001d x6 : 00000000ffffffff
[ 1669.946702] x5 : ffff000008a36310 x4 : ffff80273088be00
[ 1669.951989] x3 : ffff000009513e90 x2 : 0000000000000000
[ 1669.957276] x1 : 00000000000000a0 x0 : ffffffff00000001
[ 1669.962563] Call trace:
[ 1669.965000]  down_write+0x24/0x70
[ 1669.968301]  debugfs_remove_recursive+0x5c/0x1b0
[ 1669.972905]  hisi_sas_debugfs_exit+0x24/0x30 [hisi_sas_main]
[ 1669.978541]  hisi_sas_v3_remove+0x130/0x150 [hisi_sas_v3_hw]
[ 1669.984175]  pci_device_remove+0x48/0xd8
[ 1669.988082]  device_release_driver_internal+0x1b4/0x250
[ 1669.993282]  device_release_driver+0x28/0x38
[ 1669.997534]  pci_stop_bus_device+0x84/0xb8
[ 1670.001611]  pci_stop_and_remove_bus_device_locked+0x24/0x40
[ 1670.007244]  remove_store+0xfc/0x140
[ 1670.010802]  dev_attr_store+0x44/0x60
[ 1670.014448]  sysfs_kf_write+0x58/0x80
[ 1670.018095]  kernfs_fop_write+0xe8/0x1f0
[ 1670.022000]  __vfs_write+0x60/0x190
[ 1670.025472]  vfs_write+0xac/0x1c0
[ 1670.028771]  ksys_write+0x6c/0xd8
[ 1670.032071]  __arm64_sys_write+0x24/0x30
[ 1670.035977]  el0_svc_common+0x78/0x130
[ 1670.039710]  el0_svc_handler+0x38/0x78
[ 1670.043442]  el0_svc+0x8/0xc

To fix this, set debugfs_dir to NULL after debugfs_remove_recursive().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225555">SUSE bug 1225555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52809</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()

fc_lport_ptp_setup() did not check the return value of fc_rport_create()
which can return NULL and would cause a NULL pointer dereference. Address
this issue by checking return value of fc_rport_create() and log error
message on fc_rport_create() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225556">SUSE bug 1225556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52810</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52810" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Add check for negative db_l2nbperpage

l2nbperpage is log2(number of blks per page), and the minimum legal
value should be 0, not negative.

In the case of l2nbperpage being negative, an error will occur
when subsequently used as shift exponent.

Syzbot reported this bug:

UBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12
shift exponent -16777216 is negative
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52811</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52811" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool

In practice the driver should never send more commands than are allocated
to a queue's event pool. In the unlikely event that this happens, the code
asserts a BUG_ON, and in the case that the kernel is not configured to
crash on panic returns a junk event pointer from the empty event list
causing things to spiral from there. This BUG_ON is a historical artifact
of the ibmvfc driver first being upstreamed, and it is well known now that
the use of BUG_ON is bad practice except in the most unrecoverable
scenario. There is nothing about this scenario that prevents the driver
from recovering and carrying on.

Remove the BUG_ON in question from ibmvfc_get_event() and return a NULL
pointer in the case of an empty event pool. Update all call sites to
ibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate
failure or recovery action.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52812</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: check num of link levels when update pcie param

In SR-IOV environment, the value of pcie_table-&gt;num_of_link_levels will
be 0, and num_of_levels - 1 will cause array index out of bounds
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225564">SUSE bug 1225564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52814" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential null pointer derefernce

The amdgpu_ras_get_context may return NULL if device
not support ras feature, so add check before using.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52815</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52815" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/vkms: fix a possible null pointer dereference

In amdgpu_vkms_conn_get_modes(), the return value of drm_cvt_mode()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_cvt_mode(). Add a check to avoid null pointer
dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225568">SUSE bug 1225568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52816" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix shift out-of-bounds issue

[  567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int'
[  567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G           OE      6.2.0-34-generic #34~22.04.1-Ubuntu
[  567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N_871 09/25/2023
[  567.614504] Workqueue: events send_exception_work_handler [amdgpu]
[  567.614748] Call Trace:
[  567.614750]  &lt;TASK&gt;
[  567.614753]  dump_stack_lvl+0x48/0x70
[  567.614761]  dump_stack+0x10/0x20
[  567.614763]  __ubsan_handle_shift_out_of_bounds+0x156/0x310
[  567.614769]  ? srso_alias_return_thunk+0x5/0x7f
[  567.614773]  ? update_sd_lb_stats.constprop.0+0xf2/0x3c0
[  567.614780]  svm_range_split_by_granularity.cold+0x2b/0x34 [amdgpu]
[  567.615047]  ? srso_alias_return_thunk+0x5/0x7f
[  567.615052]  svm_migrate_to_ram+0x185/0x4d0 [amdgpu]
[  567.615286]  do_swap_page+0x7b6/0xa30
[  567.615291]  ? srso_alias_return_thunk+0x5/0x7f
[  567.615294]  ? __free_pages+0x119/0x130
[  567.615299]  handle_pte_fault+0x227/0x280
[  567.615303]  __handle_mm_fault+0x3c0/0x720
[  567.615311]  handle_mm_fault+0x119/0x330
[  567.615314]  ? lock_mm_and_find_vma+0x44/0x250
[  567.615318]  do_user_addr_fault+0x1a9/0x640
[  567.615323]  exc_page_fault+0x81/0x1b0
[  567.615328]  asm_exc_page_fault+0x27/0x30
[  567.615332] RIP: 0010:__get_user_8+0x1c/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL

In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:

1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G           OE     5.15.0-43-generic #46-Ubunt       u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS:  00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]  &lt;TASK&gt;
[4005007.702640]  amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]
[4005007.703002]  full_proxy_read+0x5c/0x80
[4005007.703011]  vfs_read+0x9f/0x1a0
[4005007.703019]  ksys_read+0x67/0xe0
[4005007.703023]  __x64_sys_read+0x19/0x20
[4005007.703028]  do_syscall_64+0x5c/0xc0
[4005007.703034]  ? do_user_addr_fault+0x1e3/0x670
[4005007.703040]  ? exit_to_user_mode_prepare+0x37/0xb0
[4005007.703047]  ? irqentry_exit_to_user_mode+0x9/0x20
[4005007.703052]  ? irqentry_exit+0x19/0x30
[4005007.703057]  ? exc_page_fault+0x89/0x160
[4005007.703062]  ? asm_exc_page_fault+0x8/0x30
[4005007.703068]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[4005007.703075] RIP: 0033:0x7f5e07672992
[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f        1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e       c 28 48 89 54 24
[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992
[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003
[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010
[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000
[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
[4005007.703105]  &lt;/TASK&gt;
[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_       iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t       tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm       i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo       mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v       2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core        drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca
[4005007.703184] CR2: 0000000000000000
[4005007.703188] ---[ en
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52818</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52818" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7

For pptable structs that use flexible array sizes, use flexible arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52819" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga

For pptable structs that use flexible array sizes, use flexible arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel: fix a possible null pointer dereference

In versatile_panel_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52825</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52825" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix a race condition of vram buffer unref in svm code

prange-&gt;svm_bo unref can happen in both mmu callback and a callback after
migrate to system ram. Both are async call in different tasks. Sync svm_bo
unref operation to avoid random "use-after-free".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52826</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52826" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference

In tpg110_get_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52832</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52832" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't return unset power in ieee80211_get_tx_power()

We can get a UBSAN warning if ieee80211_get_tx_power() returns the
INT_MIN value mac80211 internally uses for "unset power level".

 UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5
 -2147483648 * 100 cannot be represented in type 'int'
 CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE
 Call Trace:
  dump_stack+0x74/0x92
  ubsan_epilogue+0x9/0x50
  handle_overflow+0x8d/0xd0
  __ubsan_handle_mul_overflow+0xe/0x10
  nl80211_send_iface+0x688/0x6b0 [cfg80211]
  [...]
  cfg80211_register_wdev+0x78/0xb0 [cfg80211]
  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]
  [...]
  ieee80211_if_add+0x60e/0x8f0 [mac80211]
  ieee80211_register_hw+0xda5/0x1170 [mac80211]

In this case, simply return an error instead, to indicate
that no data is available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52833</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52833" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: Add date-&gt;evt_skb is NULL check

fix crash because of null pointers

[ 6104.969662] BUG: kernel NULL pointer dereference, address: 00000000000000c8
[ 6104.969667] #PF: supervisor read access in kernel mode
[ 6104.969668] #PF: error_code(0x0000) - not-present page
[ 6104.969670] PGD 0 P4D 0
[ 6104.969673] Oops: 0000 [#1] SMP NOPTI
[ 6104.969684] RIP: 0010:btusb_mtk_hci_wmt_sync+0x144/0x220 [btusb]
[ 6104.969688] RSP: 0018:ffffb8d681533d48 EFLAGS: 00010246
[ 6104.969689] RAX: 0000000000000000 RBX: ffff8ad560bb2000 RCX: 0000000000000006
[ 6104.969691] RDX: 0000000000000000 RSI: ffffb8d681533d08 RDI: 0000000000000000
[ 6104.969692] RBP: ffffb8d681533d70 R08: 0000000000000001 R09: 0000000000000001
[ 6104.969694] R10: 0000000000000001 R11: 00000000fa83b2da R12: ffff8ad461d1d7c0
[ 6104.969695] R13: 0000000000000000 R14: ffff8ad459618c18 R15: ffffb8d681533d90
[ 6104.969697] FS:  00007f5a1cab9d40(0000) GS:ffff8ad578200000(0000) knlGS:00000
[ 6104.969699] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 6104.969700] CR2: 00000000000000c8 CR3: 000000018620c001 CR4: 0000000000760ef0
[ 6104.969701] PKRU: 55555554
[ 6104.969702] Call Trace:
[ 6104.969708]  btusb_mtk_shutdown+0x44/0x80 [btusb]
[ 6104.969732]  hci_dev_do_close+0x470/0x5c0 [bluetooth]
[ 6104.969748]  hci_rfkill_set_block+0x56/0xa0 [bluetooth]
[ 6104.969753]  rfkill_set_block+0x92/0x160
[ 6104.969755]  rfkill_fop_write+0x136/0x1e0
[ 6104.969759]  __vfs_write+0x18/0x40
[ 6104.969761]  vfs_write+0xdf/0x1c0
[ 6104.969763]  ksys_write+0xb1/0xe0
[ 6104.969765]  __x64_sys_write+0x1a/0x20
[ 6104.969769]  do_syscall_64+0x51/0x180
[ 6104.969771]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 6104.969773] RIP: 0033:0x7f5a21f18fef
[ 6104.9] RSP: 002b:00007ffeefe39010 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[ 6104.969780] RAX: ffffffffffffffda RBX: 000055c10a7560a0 RCX: 00007f5a21f18fef
[ 6104.969781] RDX: 0000000000000008 RSI: 00007ffeefe39060 RDI: 0000000000000012
[ 6104.969782] RBP: 00007ffeefe39060 R08: 0000000000000000 R09: 0000000000000017
[ 6104.969784] R10: 00007ffeefe38d97 R11: 0000000000000293 R12: 0000000000000002
[ 6104.969785] R13: 00007ffeefe39220 R14: 00007ffeefe391a0 R15: 000055c10a72acf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52834" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atl1c: Work around the DMA RX overflow issue

This is based on alx driver commit 881d0327db37 ("net: alx: Work around
the DMA RX overflow issue").

The alx and atl1c drivers had RX overflow error which was why a custom
allocator was created to avoid certain addresses. The simpler workaround
then created for alx driver, but not for atl1c due to lack of tester.

Instead of using a custom allocator, check the allocated skb address and
use skb_reserve() to move away from problematic 0x...fc0 address.

Tested on AR8131 on Acer 4540.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Bail out early if the request AUX area is out of bound

When perf-record with a large AUX area, e.g 4GB, it fails with:

    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1
    failed to mmap with 12 (Cannot allocate memory)

and it reveals a WARNING with __alloc_pages():

	------------[ cut here ]------------
	WARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248
	Call trace:
	 __alloc_pages+0x1ec/0x248
	 __kmalloc_large_node+0xc0/0x1f8
	 __kmalloc_node+0x134/0x1e8
	 rb_alloc_aux+0xe0/0x298
	 perf_mmap+0x440/0x660
	 mmap_region+0x308/0x8a8
	 do_mmap+0x3c0/0x528
	 vm_mmap_pgoff+0xf4/0x1b8
	 ksys_mmap_pgoff+0x18c/0x218
	 __arm64_sys_mmap+0x38/0x58
	 invoke_syscall+0x50/0x128
	 el0_svc_common.constprop.0+0x58/0x188
	 do_el0_svc+0x34/0x50
	 el0_svc+0x34/0x108
	 el0t_64_sync_handler+0xb8/0xc0
	 el0t_64_sync+0x1a4/0x1a8

'rb-&gt;aux_pages' allocated by kcalloc() is a pointer array which is used to
maintains AUX trace pages. The allocated page for this array is physically
contiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the
size of pointer array crosses the limitation set by MAX_ORDER, it reveals a
WARNING.

So bail out early with -ENOMEM if the request AUX area is out of bound,
e.g.:

    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1
    failed to mmap with 12 (Cannot allocate memory)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225602">SUSE bug 1225602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52837</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52837" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix uaf in nbd_open

Commit 4af5f2e03013 ("nbd: use blk_mq_alloc_disk and
blk_cleanup_disk") cleans up disk by blk_cleanup_disk() and it won't set
disk-&gt;private_data as NULL as before. UAF may be triggered in nbd_open()
if someone tries to open nbd device right after nbd_put() since nbd has
been free in nbd_dev_remove().

Fix this by implementing -&gt;free_disk and free private data in it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: imsttfb: fix a resource leak in probe

I've re-written the error handling but the bug is that if init_imstt()
fails we need to call iounmap(par-&gt;cmap_regs).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52840" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()

The put_device() calls rmi_release_function() which frees "fn" so the
dereference on the next line "fn-&gt;num_of_irqs" is a use after free.
Move the put_device() to the end to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: mux: Add check and kfree for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
Moreover, use kfree() in the later error handling in order to avoid
memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52843</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52843" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: verify mac len before reading mac header

LLC reads the mac header with eth_hdr without verifying that the skb
has an Ethernet header.

Syzbot was able to enter llc_rcv on a tun device. Tun can insert
packets without mac len and with user configurable skb-&gt;protocol
(passing a tun_pi header when not configuring IFF_NO_PI).

    BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
    BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
    llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
    llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
    llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218
    __netif_receive_skb_one_core net/core/dev.c:5523 [inline]
    __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637
    netif_receive_skb_internal net/core/dev.c:5723 [inline]
    netif_receive_skb+0x58/0x660 net/core/dev.c:5782
    tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
    tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002

Add a mac_len test before all three eth_hdr(skb) calls under net/llc.

There are further uses in include/net/llc_pdu.h. All these are
protected by a test skb-&gt;protocol == ETH_P_802_2. Which does not
protect against this tun scenario.

But the mac_len test added in this patch in llc_fixup_skb will
indirectly protect those too. That is called from llc_rcv before any
other LLC code.

It is tempting to just add a blanket mac_len check in llc_rcv, but
not sure whether that could break valid LLC paths that do not assume
an Ethernet header. 802.2 LLC may be used on top of non-802.3
protocols in principle. The below referenced commit shows that used
to, on top of Token Ring.

At least one of the three eth_hdr uses goes back to before the start
of git history. But the one that syzbot exercises is introduced in
this commit. That commit is old enough (2008), that effectively all
stable kernels should receive this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224951">SUSE bug 1224951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52844</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52844" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: psi: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52845</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52845" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING

syzbot reported the following uninit-value access issue [1]:

=====================================================
BUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline]
BUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756
 strlen lib/string.c:418 [inline]
 strstr+0xb8/0x2f0 lib/string.c:756
 tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595
 genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline]
 genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline]
 genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066
 netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545
 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075
 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]
 netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595
 __sys_sendmsg net/socket.c:2624 [inline]
 __do_sys_sendmsg net/socket.c:2633 [inline]
 __se_sys_sendmsg net/socket.c:2631 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
 slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559
 __alloc_skb+0x318/0x740 net/core/skbuff.c:650
 alloc_skb include/linux/skbuff.h:1286 [inline]
 netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline]
 netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595
 __sys_sendmsg net/socket.c:2624 [inline]
 __do_sys_sendmsg net/socket.c:2633 [inline]
 __se_sys_sendmsg net/socket.c:2631 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

TIPC bearer-related names including link names must be null-terminated
strings. If a link name which is not null-terminated is passed through
netlink, strstr() and similar functions can cause buffer overrun. This
causes the above issue.

This patch changes the nla_policy for bearer-related names from NLA_STRING
to NLA_NUL_STRING. This resolves the issue by ensuring that only
null-terminated strings are accepted as bearer-related names.

syzbot reported similar uninit-value issue related to bearer names [2]. The
root cause of this issue is that a non-null-terminated bearer name was
passed. This patch also resolved this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225585">SUSE bug 1225585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52846</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52846" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hsr: Prevent use after free in prp_create_tagged_frame()

The prp_fill_rct() function can fail.  In that situation, it frees the
skb and returns NULL.  Meanwhile on the success path, it returns the
original skb.  So it's straight forward to fix bug by using the returned
value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225099">SUSE bug 1225099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52847</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: bttv: fix use after free error due to btv-&gt;timeout timer

There may be some a race condition between timer function
bttv_irq_timeout and bttv_remove. The timer is setup in
probe and there is no timer_delete operation in remove
function. When it hit kfree btv, the function might still be
invoked, which will cause use after free bug.

This bug is found by static analysis, it may be false positive.

Fix it by adding del_timer_sync invoking to the remove function.

cpu0                cpu1
                  bttv_probe
                    -&gt;timer_setup
                      -&gt;bttv_set_dma
                        -&gt;mod_timer;
bttv_remove
  -&gt;kfree(btv);
                  -&gt;bttv_irq_timeout
                    -&gt;USE btv
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52851" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF

In the unlikely event that workqueue allocation fails and returns NULL in
mlx5_mkey_cache_init(), delete the call to
mlx5r_umr_resource_cleanup() (which frees the QP) in
mlx5_ib_stage_post_ib_reg_umr_init().  This will avoid attempted double
free of the same QP when __mlx5_ib_add() does its cleanup.

Resolves a splat:

   Syzkaller reported a UAF in ib_destroy_qp_user

   workqueue: Failed to create a rescuer kthread for wq "mkey_cache": -EINTR
   infiniband mlx5_0: mlx5_mkey_cache_init:981:(pid 1642):
   failed to create work queue
   infiniband mlx5_0: mlx5_ib_stage_post_ib_reg_umr_init:4075:(pid 1642):
   mr cache init failed -12
   ==================================================================
   BUG: KASAN: slab-use-after-free in ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2073)
   Read of size 8 at addr ffff88810da310a8 by task repro_upstream/1642

   Call Trace:
   &lt;TASK&gt;
   kasan_report (mm/kasan/report.c:590)
   ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2073)
   mlx5r_umr_resource_cleanup (drivers/infiniband/hw/mlx5/umr.c:198)
   __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4178)
   mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)
   ...
   &lt;/TASK&gt;

   Allocated by task 1642:
   __kmalloc (./include/linux/kasan.h:198 mm/slab_common.c:1026
   mm/slab_common.c:1039)
   create_qp (./include/linux/slab.h:603 ./include/linux/slab.h:720
   ./include/rdma/ib_verbs.h:2795 drivers/infiniband/core/verbs.c:1209)
   ib_create_qp_kernel (drivers/infiniband/core/verbs.c:1347)
   mlx5r_umr_resource_init (drivers/infiniband/hw/mlx5/umr.c:164)
   mlx5_ib_stage_post_ib_reg_umr_init (drivers/infiniband/hw/mlx5/main.c:4070)
   __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4168)
   mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)
   ...

   Freed by task 1642:
   __kmem_cache_free (mm/slub.c:1826 mm/slub.c:3809 mm/slub.c:3822)
   ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2112)
   mlx5r_umr_resource_cleanup (drivers/infiniband/hw/mlx5/umr.c:198)
   mlx5_ib_stage_post_ib_reg_umr_init (drivers/infiniband/hw/mlx5/main.c:4076
   drivers/infiniband/hw/mlx5/main.c:4065)
   __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4168)
   mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)
   ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225587">SUSE bug 1225587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hid: cp2112: Fix duplicate workqueue initialization

Previously the cp2112 driver called INIT_DELAYED_WORK within
cp2112_gpio_irq_startup, resulting in duplicate initilizations of the
workqueue on subsequent IRQ startups following an initial request. This
resulted in a warning in set_work_data in workqueue.c, as well as a rare
NULL dereference within process_one_work in workqueue.c.

Initialize the workqueue within _probe instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52854" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix refcnt handling in padata_free_shell()

In a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead
to system UAF (Use-After-Free) issues. Due to the lengthy analysis of
the pcrypt_aead01 function call, I'll describe the problem scenario
using a simplified model:

Suppose there's a user of padata named `user_function` that adheres to
the padata requirement of calling `padata_free_shell` after `serial()`
has been invoked, as demonstrated in the following code:

```c
struct request {
    struct padata_priv padata;
    struct completion *done;
};

void parallel(struct padata_priv *padata) {
    do_something();
}

void serial(struct padata_priv *padata) {
    struct request *request = container_of(padata,
    				struct request,
				padata);
    complete(request-&gt;done);
}

void user_function() {
    DECLARE_COMPLETION(done)
    padata-&gt;parallel = parallel;
    padata-&gt;serial = serial;
    padata_do_parallel();
    wait_for_completion(&amp;done);
    padata_free_shell();
}
```

In the corresponding padata.c file, there's the following code:

```c
static void padata_serial_worker(struct work_struct *serial_work) {
    ...
    cnt = 0;

    while (!list_empty(&amp;local_list)) {
        ...
        padata-&gt;serial(padata);
        cnt++;
    }

    local_bh_enable();

    if (refcount_sub_and_test(cnt, &amp;pd-&gt;refcnt))
        padata_free_pd(pd);
}
```

Because of the high system load and the accumulation of unexecuted
softirq at this moment, `local_bh_enable()` in padata takes longer
to execute than usual. Subsequently, when accessing `pd-&gt;refcnt`,
`pd` has already been released by `padata_free_shell()`, resulting
in a UAF issue with `pd-&gt;refcnt`.

The fix is straightforward: add `refcount_dec_and_test` before calling
`padata_free_pd` in `padata_free_shell`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency

In _dwc2_hcd_urb_enqueue(), "urb-&gt;hcpriv = NULL" is executed without
holding the lock "hsotg-&gt;lock". In _dwc2_hcd_urb_dequeue():

    spin_lock_irqsave(&amp;hsotg-&gt;lock, flags);
    ...
	if (!urb-&gt;hcpriv) {
		dev_dbg(hsotg-&gt;dev, "## urb-&gt;hcpriv is NULL ##\n");
		goto out;
	}
    rc = dwc2_hcd_urb_dequeue(hsotg, urb-&gt;hcpriv); // Use urb-&gt;hcpriv
    ...
out:
    spin_unlock_irqrestore(&amp;hsotg-&gt;lock, flags);

When _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are
concurrently executed, the NULL check of "urb-&gt;hcpriv" can be executed
before "urb-&gt;hcpriv = NULL". After urb-&gt;hcpriv is NULL, it can be used
in the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL
pointer dereference.

This possible bug is found by an experimental static analysis tool
developed by myself. This tool analyzes the locking APIs to extract
function pairs that can be concurrently executed, and then analyzes the
instructions in the paired functions to identify possible concurrency
bugs including data races and atomicity violations. The above possible
bug is reported, when my tool analyzes the source code of Linux 6.5.

To fix this possible bug, "urb-&gt;hcpriv = NULL" should be executed with
holding the lock "hsotg-&gt;lock". After using this patch, my tool never
reports the possible bug, with the kernelconfiguration allyesconfig for
x86_64. Because I have no associated hardware, I cannot test the patch
in runtime testing, and just verify it according to the code logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52856</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52856" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: lt8912b: Fix crash on bridge detach

The lt8912b driver, in its bridge detach function, calls
drm_connector_unregister() and drm_connector_cleanup().

drm_connector_unregister() should be called only for connectors
explicitly registered with drm_connector_register(), which is not the
case in lt8912b.

The driver's drm_connector_funcs.destroy hook is set to
drm_connector_cleanup().

Thus the driver should not call either drm_connector_unregister() nor
drm_connector_cleanup() in its lt8912_bridge_detach(), as they cause a
crash on bridge detach:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=00000000858f3000
[0000000000000000] pgd=0800000085918003, p4d=0800000085918003, pud=0800000085431003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in: tidss(-) display_connector lontium_lt8912b tc358768 panel_lvds panel_simple drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks
CPU: 3 PID: 462 Comm: rmmod Tainted: G        W          6.5.0-rc2+ #2
Hardware name: Toradex Verdin AM62 on Verdin Development Board (DT)
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : drm_connector_cleanup+0x78/0x2d4 [drm]
lr : lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]
sp : ffff800082ed3a90
x29: ffff800082ed3a90 x28: ffff0000040c1940 x27: 0000000000000000
x26: 0000000000000000 x25: dead000000000122 x24: dead000000000122
x23: dead000000000100 x22: ffff000003fb6388 x21: 0000000000000000
x20: 0000000000000000 x19: ffff000003fb6260 x18: fffffffffffe56e8
x17: 0000000000000000 x16: 0010000000000000 x15: 0000000000000038
x14: 0000000000000000 x13: ffff800081914b48 x12: 000000000000040e
x11: 000000000000015a x10: ffff80008196ebb8 x9 : ffff800081914b48
x8 : 00000000ffffefff x7 : ffff0000040c1940 x6 : ffff80007aa649d0
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008159e008
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 drm_connector_cleanup+0x78/0x2d4 [drm]
 lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]
 drm_bridge_detach+0x44/0x84 [drm]
 drm_encoder_cleanup+0x40/0xb8 [drm]
 drmm_encoder_alloc_release+0x1c/0x30 [drm]
 drm_managed_release+0xac/0x148 [drm]
 drm_dev_put.part.0+0x88/0xb8 [drm]
 devm_drm_dev_init_release+0x14/0x24 [drm]
 devm_action_release+0x14/0x20
 release_nodes+0x5c/0x90
 devres_release_all+0x8c/0xe0
 device_unbind_cleanup+0x18/0x68
 device_release_driver_internal+0x208/0x23c
 driver_detach+0x4c/0x94
 bus_remove_driver+0x70/0xf4
 driver_unregister+0x30/0x60
 platform_driver_unregister+0x14/0x20
 tidss_platform_driver_exit+0x18/0xb2c [tidss]
 __arm64_sys_delete_module+0x1a0/0x2b4
 invoke_syscall+0x48/0x110
 el0_svc_common.constprop.0+0x60/0x10c
 do_el0_svc_compat+0x1c/0x40
 el0_svc_compat+0x40/0xac
 el0t_32_sync_handler+0xb0/0x138
 el0t_32_sync+0x194/0x198
Code: 9104a276 f2fbd5b7 aa0203e1 91008af8 (f85c0420)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52857</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Fix coverity issue with unintentional integer overflow

1. Instead of multiplying 2 variable of different types. Change to
assign a value of one variable and then multiply the other variable.

2. Add a int variable for multiplier calculation instead of calculating
different types multiplier with dma_addr_t variable directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225581">SUSE bug 1225581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52858</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52859</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: hisi: Fix use-after-free when register pmu fails

When we fail to register the uncore pmu, the pmu context may not been
allocated. The error handing will call cpuhp_state_remove_instance()
to call uncore pmu offline callback, which migrate the pmu context.
Since that's liable to lead to some kind of use-after-free.

Use cpuhp_state_remove_instance_nocalls() instead of
cpuhp_state_remove_instance() so that the notifiers don't execute after
the PMU device has been failed to register.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225582">SUSE bug 1225582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process

When tearing down a 'hisi_hns3' PMU, we mistakenly run the CPU hotplug
callbacks after the device has been unregistered, leading to fireworks
when we try to execute empty function callbacks within the driver:

  | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
  | CPU: 0 PID: 15 Comm: cpuhp/0 Tainted: G        W  O      5.12.0-rc4+ #1
  | Hardware name:  , BIOS KpxxxFPGA 1P B600 V143 04/22/2021
  | pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--)
  | pc : perf_pmu_migrate_context+0x98/0x38c
  | lr : perf_pmu_migrate_context+0x94/0x38c
  |
  | Call trace:
  |  perf_pmu_migrate_context+0x98/0x38c
  |  hisi_hns3_pmu_offline_cpu+0x104/0x12c [hisi_hns3_pmu]

Use cpuhp_state_remove_instance_nocalls() instead of
cpuhp_state_remove_instance() so that the notifiers don't execute after
the PMU device has been unregistered.

[will: Rewrote commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224936">SUSE bug 1224936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52861" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: it66121: Fix invalid connector dereference

Fix the NULL pointer dereference when no monitor is connected, and the
sound card is opened from userspace.

Instead return an empty buffer (of zeroes) as the EDID information to
the sound framework if there is no connector attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224941">SUSE bug 1224941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (axi-fan-control) Fix possible NULL pointer dereference

axi_fan_control_irq_handler(), dependent on the private
axi_fan_control_data structure, might be called before the hwmon
device is registered. That will cause an "Unable to handle kernel
NULL pointer dereference" error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225586">SUSE bug 1225586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52864</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: wmi: Fix opening of char device

Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via
file private data"), the miscdevice stores a pointer to itself inside
filp-&gt;private_data, which means that private_data will not be NULL when
wmi_char_open() is called. This might cause memory corruption should
wmi_char_open() be unable to find its driver, something which can
happen when the associated WMI device is deleted in wmi_free_devices().

Fix the problem by using the miscdevice pointer to retrieve the WMI
device data associated with a char device using container_of(). This
also avoids wmi_char_open() picking a wrong WMI device bound to a
driver with the same name as the original driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52865</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: possible buffer overflow

Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is
checked after access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: prevent potential string overflow

The dev-&gt;id value comes from ida_alloc() so it's a number between zero
and INT_MAX.  If it's too high then these sprintf()s will overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52869</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52869" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/platform: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225050">SUSE bug 1225050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52870</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52870" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: llcc: Handle a second device without data corruption

Usually there is only one llcc device. But if there were a second, even
a failed probe call would modify the global drv_data pointer. So check
if drv_data is valid before overwriting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227475">SUSE bug 1227475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52872</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52872" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix race condition in status line change on dead connections

gsm_cleanup_mux() cleans up the gsm by closing all DLCIs, stopping all
timers, removing the virtual tty devices and clearing the data queues.
This procedure, however, may cause subsequent changes of the virtual modem
status lines of a DLCI. More data is being added the outgoing data queue
and the deleted kick timer is restarted to handle this. At this point many
resources have already been removed by the cleanup procedure. Thus, a
kernel panic occurs.

Fix this by proving in gsm_modem_update() that the cleanup procedure has
not been started and the mux is still alive.

Note that writing to a virtual tty is already protected by checks against
the DLCI specific connection state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52873</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52873" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52875</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52875" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52876</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52876" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52877</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()

It is possible that typec_register_partner() returns ERR_PTR on failure.
When port-&gt;partner is an error, a NULL pointer dereference may occur as
shown below.

[91222.095236][  T319] typec port0: failed to register partner (-17)
...
[91225.061491][  T319] Unable to handle kernel NULL pointer dereference
at virtual address 000000000000039f
[91225.274642][  T319] pc : tcpm_pd_data_request+0x310/0x13fc
[91225.274646][  T319] lr : tcpm_pd_data_request+0x298/0x13fc
[91225.308067][  T319] Call trace:
[91225.308070][  T319]  tcpm_pd_data_request+0x310/0x13fc
[91225.308073][  T319]  tcpm_pd_rx_handler+0x100/0x9e8
[91225.355900][  T319]  kthread_worker_fn+0x178/0x58c
[91225.355902][  T319]  kthread+0x150/0x200
[91225.355905][  T319]  ret_from_fork+0x10/0x30

Add a check for port-&gt;partner to avoid dereferencing a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52878</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds

If the "struct can_priv::echoo_skb" is accessed out of bounds, this
would cause a kernel crash. Instead, issue a meaningful warning
message and return with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52880</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc

Any unprivileged user can attach N_GSM0710 ldisc, but it requires
CAP_NET_ADMIN to create a GSM network anyway.

Require initial namespace CAP_NET_ADMIN to do that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52881</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: do not accept ACK of bytes we never sent

This patch is based on a detailed report and ideas from Yepeng Pan
and Christian Rossow.

ACK seq validation is currently following RFC 5961 5.2 guidelines:

   The ACK value is considered acceptable only if
   it is in the range of ((SND.UNA - MAX.SND.WND) &lt;= SEG.ACK &lt;=
   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the
   above condition MUST be discarded and an ACK sent back.  It needs to
   be noted that RFC 793 on page 72 (fifth check) says: "If the ACK is a
   duplicate (SEG.ACK &lt; SND.UNA), it can be ignored.  If the ACK
   acknowledges something not yet sent (SEG.ACK &gt; SND.NXT) then send an
   ACK, drop the segment, and return".  The "ignored" above implies that
   the processing of the incoming data segment continues, which means
   the ACK value is treated as acceptable.  This mitigation makes the
   ACK check more stringent since any ACK &lt; SND.UNA wouldn't be
   accepted, instead only ACKs that are in the range ((SND.UNA -
   MAX.SND.WND) &lt;= SEG.ACK &lt;= SND.NXT) get through.

This can be refined for new (and possibly spoofed) flows,
by not accepting ACK for bytes that were never sent.

This greatly improves TCP security at a little cost.

I added a Fixes: tag to make sure this patch will reach stable trees,
even if the 'blamed' patch was adhering to the RFC.

tp-&gt;bytes_acked was added in linux-4.2

Following packetdrill test (courtesy of Yepeng Pan) shows
the issue at hand:

0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1024) = 0

// ---------------- Handshake ------------------- //

// when window scale is set to 14 the window size can be extended to
// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet
// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)
// ,though this ack number acknowledges some data never
// sent by the server.

+0 &lt; S 0:0(0) win 65535 &lt;mss 1400,nop,wscale 14&gt;
+0 &gt; S. 0:0(0) ack 1 &lt;...&gt;
+0 &lt; . 1:1(0) ack 1 win 65535
+0 accept(3, ..., ...) = 4

// For the established connection, we send an ACK packet,
// the ack packet uses ack number 1 - 1073725300 + 2^32,
// where 2^32 is used to wrap around.
// Note: we used 1073725300 instead of 1073725440 to avoid possible
// edge cases.
// 1 - 1073725300 + 2^32 = 3221241997

// Oops, old kernels happily accept this packet.
+0 &lt; . 1:1001(1000) ack 3221241997 win 65535

// After the kernel fix the following will be replaced by a challenge ACK,
// and prior malicious frame would be dropped.
+0 &gt; . 1:1(0) ack 1001
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226152">SUSE bug 1226152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52882</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change

While PLL CPUX clock rate change when CPU is running from it works in
vast majority of cases, now and then it causes instability. This leads
to system crashes and other undefined behaviour. After a lot of testing
(30+ hours) while also doing a lot of frequency switches, we can't
observe any instability issues anymore when doing reparenting to stable
clock like 24 MHz oscillator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225692">SUSE bug 1225692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cyapa - add missing input core locking to suspend/resume functions

Grab input-&gt;mutex during suspend/resume functions like it is done in
other input drivers. This fixes the following warning during system
suspend/resume cycle on Samsung Exynos5250-based Snow Chromebook:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
...
------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226764">SUSE bug 1226764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52885</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix UAF in svc_tcp_listen_data_ready()

After the listener svc_sock is freed, and before invoking svc_tcp_accept()
for the established child sock, there is a window that the newsock
retaining a freed listener svc_sock in sk_user_data which cloning from
parent. In the race window, if data is received on the newsock, we will
observe use-after-free report in svc_tcp_listen_data_ready().

Reproduce by two tasks:

1. while :; do rpc.nfsd 0 ; rpc.nfsd; done
2. while :; do echo "" | ncat -4 127.0.0.1 2049 ; done

KASAN report:

  ==================================================================
  BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]
  Read of size 8 at addr ffff888139d96228 by task nc/102553
  CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18
  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
  Call Trace:
   &lt;IRQ&gt;
   dump_stack_lvl+0x33/0x50
   print_address_description.constprop.0+0x27/0x310
   print_report+0x3e/0x70
   kasan_report+0xae/0xe0
   svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]
   tcp_data_queue+0x9f4/0x20e0
   tcp_rcv_established+0x666/0x1f60
   tcp_v4_do_rcv+0x51c/0x850
   tcp_v4_rcv+0x23fc/0x2e80
   ip_protocol_deliver_rcu+0x62/0x300
   ip_local_deliver_finish+0x267/0x350
   ip_local_deliver+0x18b/0x2d0
   ip_rcv+0x2fb/0x370
   __netif_receive_skb_one_core+0x166/0x1b0
   process_backlog+0x24c/0x5e0
   __napi_poll+0xa2/0x500
   net_rx_action+0x854/0xc90
   __do_softirq+0x1bb/0x5de
   do_softirq+0xcb/0x100
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   ...
   &lt;/TASK&gt;

  Allocated by task 102371:
   kasan_save_stack+0x1e/0x40
   kasan_set_track+0x21/0x30
   __kasan_kmalloc+0x7b/0x90
   svc_setup_socket+0x52/0x4f0 [sunrpc]
   svc_addsock+0x20d/0x400 [sunrpc]
   __write_ports_addfd+0x209/0x390 [nfsd]
   write_ports+0x239/0x2c0 [nfsd]
   nfsctl_transaction_write+0xac/0x110 [nfsd]
   vfs_write+0x1c3/0xae0
   ksys_write+0xed/0x1c0
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

  Freed by task 102551:
   kasan_save_stack+0x1e/0x40
   kasan_set_track+0x21/0x30
   kasan_save_free_info+0x2a/0x50
   __kasan_slab_free+0x106/0x190
   __kmem_cache_free+0x133/0x270
   svc_xprt_free+0x1e2/0x350 [sunrpc]
   svc_xprt_destroy_all+0x25a/0x440 [sunrpc]
   nfsd_put+0x125/0x240 [nfsd]
   nfsd_svc+0x2cb/0x3c0 [nfsd]
   write_threads+0x1ac/0x2a0 [nfsd]
   nfsctl_transaction_write+0xac/0x110 [nfsd]
   vfs_write+0x1c3/0xae0
   ksys_write+0xed/0x1c0
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

Fix the UAF by simply doing nothing in svc_tcp_listen_data_ready()
if state != TCP_LISTEN, that will avoid dereferencing svsk for all
child socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227753">SUSE bug 1227753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52886</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix race by not overwriting udev-&gt;descriptor in hub_port_init()

Syzbot reported an out-of-bounds read in sysfs.c:read_descriptors():

BUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883
Read of size 8 at addr ffff88801e78b8c8 by task udevd/5011

CPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-g40f71e7cd3c6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
 print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351
 print_report mm/kasan/report.c:462 [inline]
 kasan_report+0x11c/0x130 mm/kasan/report.c:572
 read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883
...
Allocated by task 758:
...
 __do_kmalloc_node mm/slab_common.c:966 [inline]
 __kmalloc+0x5e/0x190 mm/slab_common.c:979
 kmalloc include/linux/slab.h:563 [inline]
 kzalloc include/linux/slab.h:680 [inline]
 usb_get_configuration+0x1f7/0x5170 drivers/usb/core/config.c:887
 usb_enumerate_device drivers/usb/core/hub.c:2407 [inline]
 usb_new_device+0x12b0/0x19d0 drivers/usb/core/hub.c:2545

As analyzed by Khazhy Kumykov, the cause of this bug is a race between
read_descriptors() and hub_port_init(): The first routine uses a field
in udev-&gt;descriptor, not expecting it to change, while the second
overwrites it.

Prior to commit 45bf39f8df7f ("USB: core: Don't hold device lock while
reading the "descriptors" sysfs file") this race couldn't occur,
because the routines were mutually exclusive thanks to the device
locking.  Removing that locking from read_descriptors() exposed it to
the race.

The best way to fix the bug is to keep hub_port_init() from changing
udev-&gt;descriptor once udev has been initialized and registered.
Drivers expect the descriptors stored in the kernel to be immutable;
we should not undermine this expectation.  In fact, this change should
have been made long ago.

So now hub_port_init() will take an additional argument, specifying a
buffer in which to store the device descriptor it reads.  (If udev has
not yet been initialized, the buffer pointer will be NULL and then
hub_port_init() will store the device descriptor in udev as before.)
This eliminates the data race responsible for the out-of-bounds read.

The changes to hub_port_init() appear more extensive than they really
are, because of indentation changes resulting from an attempt to avoid
writing to other parts of the usb_device structure after it has been
initialized.  Similar changes should be made to the code that reads
the BOS descriptor, but that can be handled in a separate patch later
on.  This patch is sufficient to fix the bug found by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52887</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new

This patch enhances error handling in scenarios with RTS (Request to
Send) messages arriving closely. It replaces the less informative WARN_ON_ONCE
backtraces with a new error handling method. This provides clearer error
messages and allows for the early termination of problematic sessions.
Previously, sessions were only released at the end of j1939_xtp_rx_rts().

Potentially this could be reproduced with something like:
testj1939 -r vcan0:0x80 &amp;
while true; do
	# send first RTS
	cansend vcan0 18EC8090#1014000303002301;
	# send second RTS
	cansend vcan0 18EC8090#1014000303002301;
	# send abort
	cansend vcan0 18EC8090#ff00000000002301;
done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228426">SUSE bug 1228426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

apparmor: Fix null pointer deref when receiving skb during sock creation

The panic below is observed when receiving ICMP packets with secmark set
while an ICMP raw socket is being created. SK_CTX(sk)-&gt;label is updated
in apparmor_socket_post_create(), but the packet is delivered to the
socket before that, causing the null pointer dereference.
Drop the packet if label context is not set.

    BUG: kernel NULL pointer dereference, address: 000000000000004c
    #PF: supervisor read access in kernel mode
    #PF: error_code(0x0000) - not-present page
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP NOPTI
    CPU: 0 PID: 407 Comm: a.out Not tainted 6.4.12-arch1-1 #1 3e6fa2753a2d75925c34ecb78e22e85a65d083df
    Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020
    RIP: 0010:aa_label_next_confined+0xb/0x40
    Code: 00 00 48 89 ef e8 d5 25 0c 00 e9 66 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 89 f0 &lt;8b&gt; 77 4c 39 c6 7e 1f 48 63 d0 48 8d 14 d7 eb 0b 83 c0 01 48 83 c2
    RSP: 0018:ffffa92940003b08 EFLAGS: 00010246
    RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000000000e
    RDX: ffffa92940003be8 RSI: 0000000000000000 RDI: 0000000000000000
    RBP: ffff8b57471e7800 R08: ffff8b574c642400 R09: 0000000000000002
    R10: ffffffffbd820eeb R11: ffffffffbeb7ff00 R12: ffff8b574c642400
    R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000000
    FS:  00007fb092ea7640(0000) GS:ffff8b577bc00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 000000000000004c CR3: 00000001020f2005 CR4: 00000000007706f0
    PKRU: 55555554
    Call Trace:
     &lt;IRQ&gt;
     ? __die+0x23/0x70
     ? page_fault_oops+0x171/0x4e0
     ? exc_page_fault+0x7f/0x180
     ? asm_exc_page_fault+0x26/0x30
     ? aa_label_next_confined+0xb/0x40
     apparmor_secmark_check+0xec/0x330
     security_sock_rcv_skb+0x35/0x50
     sk_filter_trim_cap+0x47/0x250
     sock_queue_rcv_skb_reason+0x20/0x60
     raw_rcv+0x13c/0x210
     raw_local_deliver+0x1f3/0x250
     ip_protocol_deliver_rcu+0x4f/0x2f0
     ip_local_deliver_finish+0x76/0xa0
     __netif_receive_skb_one_core+0x89/0xa0
     netif_receive_skb+0x119/0x170
     ? __netdev_alloc_skb+0x3d/0x140
     vmxnet3_rq_rx_complete+0xb23/0x1010 [vmxnet3 56a84f9c97178c57a43a24ec073b45a9d6f01f3a]
     vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3 56a84f9c97178c57a43a24ec073b45a9d6f01f3a]
     __napi_poll+0x28/0x1b0
     net_rx_action+0x2a4/0x380
     __do_softirq+0xd1/0x2c8
     __irq_exit_rcu+0xbb/0xf0
     common_interrupt+0x86/0xa0
     &lt;/IRQ&gt;
     &lt;TASK&gt;
     asm_common_interrupt+0x26/0x40
    RIP: 0010:apparmor_socket_post_create+0xb/0x200
    Code: 08 48 85 ff 75 a1 eb b1 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 &lt;55&gt; 48 89 fd 53 45 85 c0 0f 84 b2 00 00 00 48 8b 1d 80 56 3f 02 48
    RSP: 0018:ffffa92940ce7e50 EFLAGS: 00000286
    RAX: ffffffffbc756440 RBX: 0000000000000000 RCX: 0000000000000001
    RDX: 0000000000000003 RSI: 0000000000000002 RDI: ffff8b574eaab740
    RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
    R10: ffff8b57444cec70 R11: 0000000000000000 R12: 0000000000000003
    R13: 0000000000000002 R14: ffff8b574eaab740 R15: ffffffffbd8e4748
     ? __pfx_apparmor_socket_post_create+0x10/0x10
     security_socket_post_create+0x4b/0x80
     __sock_create+0x176/0x1f0
     __sys_socket+0x89/0x100
     __x64_sys_socket+0x17/0x20
     do_syscall_64+0x5d/0x90
     ? do_syscall_64+0x6c/0x90
     ? do_syscall_64+0x6c/0x90
     ? do_syscall_64+0x6c/0x90
     entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229287">SUSE bug 1229287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52893</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52893" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gsmi: fix null-deref in gsmi_get_variable

We can get EFI variables without fetching the attribute, so we must
allow for that in gsmi.

commit 859748255b43 ("efi: pstore: Omit efivars caching EFI varstore
access layer") added a new get_variable call with attr=NULL, which
triggers panic in gsmi.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52894</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52894" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()

In Google internal bug 265639009 we've received an (as yet) unreproducible
crash report from an aarch64 GKI 5.10.149-android13 running device.

AFAICT the source code is at:
  https://android.googlesource.com/kernel/common/+/refs/tags/ASB-2022-12-05_13-5.10

The call stack is:
  ncm_close() -&gt; ncm_notify() -&gt; ncm_do_notify()
with the crash at:
  ncm_do_notify+0x98/0x270
Code: 79000d0b b9000a6c f940012a f9400269 (b9405d4b)

Which I believe disassembles to (I don't know ARM assembly, but it looks sane enough to me...):

  // halfword (16-bit) store presumably to event-&gt;wLength (at offset 6 of struct usb_cdc_notification)
  0B 0D 00 79    strh w11, [x8, #6]

  // word (32-bit) store presumably to req-&gt;Length (at offset 8 of struct usb_request)
  6C 0A 00 B9    str  w12, [x19, #8]

  // x10 (NULL) was read here from offset 0 of valid pointer x9
  // IMHO we're reading 'cdev-&gt;gadget' and getting NULL
  // gadget is indeed at offset 0 of struct usb_composite_dev
  2A 01 40 F9    ldr  x10, [x9]

  // loading req-&gt;buf pointer, which is at offset 0 of struct usb_request
  69 02 40 F9    ldr  x9, [x19]

  // x10 is null, crash, appears to be attempt to read cdev-&gt;gadget-&gt;max_speed
  4B 5D 40 B9    ldr  w11, [x10, #0x5c]

which seems to line up with ncm_do_notify() case NCM_NOTIFY_SPEED code fragment:

  event-&gt;wLength = cpu_to_le16(8);
  req-&gt;length = NCM_STATUS_BYTECOUNT;

  /* SPEED_CHANGE data is up/down speeds in bits/sec */
  data = req-&gt;buf + sizeof *event;
  data[0] = cpu_to_le32(ncm_bitrate(cdev-&gt;gadget));

My analysis of registers and NULL ptr deref crash offset
  (Unable to handle kernel NULL pointer dereference at virtual address 000000000000005c)
heavily suggests that the crash is due to 'cdev-&gt;gadget' being NULL when executing:
  data[0] = cpu_to_le32(ncm_bitrate(cdev-&gt;gadget));
which calls:
  ncm_bitrate(NULL)
which then calls:
  gadget_is_superspeed(NULL)
which reads
  ((struct usb_gadget *)NULL)-&gt;max_speed
and hits a panic.

AFAICT, if I'm counting right, the offset of max_speed is indeed 0x5C.
(remember there's a GKI KABI reservation of 16 bytes in struct work_struct)

It's not at all clear to me how this is all supposed to work...
but returning 0 seems much better than panic-ing...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52896" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race between quota rescan and disable leading to NULL pointer deref

If we have one task trying to start the quota rescan worker while another
one is trying to disable quotas, we can end up hitting a race that results
in the quota rescan worker doing a NULL pointer dereference. The steps for
this are the following:

1) Quotas are enabled;

2) Task A calls the quota rescan ioctl and enters btrfs_qgroup_rescan().
   It calls qgroup_rescan_init() which returns 0 (success) and then joins a
   transaction and commits it;

3) Task B calls the quota disable ioctl and enters btrfs_quota_disable().
   It clears the bit BTRFS_FS_QUOTA_ENABLED from fs_info-&gt;flags and calls
   btrfs_qgroup_wait_for_completion(), which returns immediately since the
   rescan worker is not yet running.
   Then it starts a transaction and locks fs_info-&gt;qgroup_ioctl_lock;

4) Task A queues the rescan worker, by calling btrfs_queue_work();

5) The rescan worker starts, and calls rescan_should_stop() at the start
   of its while loop, which results in 0 iterations of the loop, since
   the flag BTRFS_FS_QUOTA_ENABLED was cleared from fs_info-&gt;flags by
   task B at step 3);

6) Task B sets fs_info-&gt;quota_root to NULL;

7) The rescan worker tries to start a transaction and uses
   fs_info-&gt;quota_root as the root argument for btrfs_start_transaction().
   This results in a NULL pointer dereference down the call chain of
   btrfs_start_transaction(). The stack trace is something like the one
   reported in Link tag below:

   general protection fault, probably for non-canonical address 0xdffffc0000000041: 0000 [#1] PREEMPT SMP KASAN
   KASAN: null-ptr-deref in range [0x0000000000000208-0x000000000000020f]
   CPU: 1 PID: 34 Comm: kworker/u4:2 Not tainted 6.1.0-syzkaller-13872-gb6bb9676f216 #0
   Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
   Workqueue: btrfs-qgroup-rescan btrfs_work_helper
   RIP: 0010:start_transaction+0x48/0x10f0 fs/btrfs/transaction.c:564
   Code: 48 89 fb 48 (...)
   RSP: 0018:ffffc90000ab7ab0 EFLAGS: 00010206
   RAX: 0000000000000041 RBX: 0000000000000208 RCX: ffff88801779ba80
   RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
   RBP: dffffc0000000000 R08: 0000000000000001 R09: fffff52000156f5d
   R10: fffff52000156f5d R11: 1ffff92000156f5c R12: 0000000000000000
   R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000003
   FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00007f2bea75b718 CR3: 000000001d0cc000 CR4: 00000000003506e0
   DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
   DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
   Call Trace:
    &lt;TASK&gt;
    btrfs_qgroup_rescan_worker+0x3bb/0x6a0 fs/btrfs/qgroup.c:3402
    btrfs_work_helper+0x312/0x850 fs/btrfs/async-thread.c:280
    process_one_work+0x877/0xdb0 kernel/workqueue.c:2289
    worker_thread+0xb14/0x1330 kernel/workqueue.c:2436
    kthread+0x266/0x300 kernel/kthread.c:376
    ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
    &lt;/TASK&gt;
   Modules linked in:

So fix this by having the rescan worker function not attempt to start a
transaction if it didn't do any rescan work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52898" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix null pointer dereference when host dies

Make sure xhci_free_dev() and xhci_kill_endpoint_urbs() do not race
and cause null pointer dereference when host suddenly dies.

Usb core may call xhci_free_dev() which frees the xhci-&gt;devs[slot_id]
virt device at the same time that xhci_kill_endpoint_urbs() tries to
loop through all the device's endpoints, checking if there are any
cancelled urbs left to give back.

hold the xhci spinlock while freeing the virt device
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52899" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52899" ref_url="https://www.suse.com/security/cve/CVE-2023-52899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Add exception protection processing for vd in axi_chan_handle_err function

Since there is no protection for vd, a kernel panic will be
triggered here in exceptional cases.

You can refer to the processing of axi_chan_block_xfer_complete function

The triggered kernel panic is as follows:

[   67.848444] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060
[   67.848447] Mem abort info:
[   67.848449]   ESR = 0x96000004
[   67.848451]   EC = 0x25: DABT (current EL), IL = 32 bits
[   67.848454]   SET = 0, FnV = 0
[   67.848456]   EA = 0, S1PTW = 0
[   67.848458] Data abort info:
[   67.848460]   ISV = 0, ISS = 0x00000004
[   67.848462]   CM = 0, WnR = 0
[   67.848465] user pgtable: 4k pages, 48-bit VAs, pgdp=00000800c4c0b000
[   67.848468] [0000000000000060] pgd=0000000000000000, p4d=0000000000000000
[   67.848472] Internal error: Oops: 96000004 [#1] SMP
[   67.848475] Modules linked in: dmatest
[   67.848479] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.100-emu_x2rc+ #11
[   67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE=--)
[   67.848487] pc : axi_chan_handle_err+0xc4/0x230
[   67.848491] lr : axi_chan_handle_err+0x30/0x230
[   67.848493] sp : ffff0803fe55ae50
[   67.848495] x29: ffff0803fe55ae50 x28: ffff800011212200
[   67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080
[   67.848504] x25: ffff800010d33880 x24: ffff80001139d850
[   67.848508] x23: ffff0800c097c168 x22: 0000000000000000
[   67.848512] x21: 0000000000000080 x20: 0000000000002000
[   67.848517] x19: ffff0800c097c080 x18: 0000000000000000
[   67.848521] x17: 0000000000000000 x16: 0000000000000000
[   67.848525] x15: 0000000000000000 x14: 0000000000000000
[   67.848529] x13: 0000000000000000 x12: 0000000000000040
[   67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a
[   67.848538] x9 : ffff800010576cd4 x8 : ffff0800c0400270
[   67.848542] x7 : 0000000000000000 x6 : ffff0800c04003e0
[   67.848546] x5 : ffff0800c0400248 x4 : ffff0800c4294480
[   67.848550] x3 : dead000000000100 x2 : dead000000000122
[   67.848555] x1 : 0000000000000100 x0 : ffff0800c097c168
[   67.848559] Call trace:
[   67.848562]  axi_chan_handle_err+0xc4/0x230
[   67.848566]  dw_axi_dma_interrupt+0xf4/0x590
[   67.848569]  __handle_irq_event_percpu+0x60/0x220
[   67.848573]  handle_irq_event+0x64/0x120
[   67.848576]  handle_fasteoi_irq+0xc4/0x220
[   67.848580]  __handle_domain_irq+0x80/0xe0
[   67.848583]  gic_handle_irq+0xc0/0x138
[   67.848585]  el1_irq+0xc8/0x180
[   67.848588]  arch_cpu_idle+0x14/0x2c
[   67.848591]  default_idle_call+0x40/0x16c
[   67.848594]  do_idle+0x1f0/0x250
[   67.848597]  cpu_startup_entry+0x2c/0x60
[   67.848600]  rest_init+0xc0/0xcc
[   67.848603]  arch_call_rest_init+0x14/0x1c
[   67.848606]  start_kernel+0x4cc/0x500
[   67.848610] Code: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 (a94602c1)
[   67.848613] ---[ end trace 585a97036f88203a ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52899/">CVE-2023-52899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52899">CVE-2023-52899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229569">SUSE bug 1229569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52900" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix general protection fault in nilfs_btree_insert()

If nilfs2 reads a corrupted disk image and tries to reads a b-tree node
block by calling __nilfs_btree_get_block() against an invalid virtual
block address, it returns -ENOENT because conversion of the virtual block
address to a disk block address fails.  However, this return value is the
same as the internal code that b-tree lookup routines return to indicate
that the block being searched does not exist, so functions that operate on
that b-tree may misbehave.

When nilfs_btree_insert() receives this spurious 'not found' code from
nilfs_btree_do_lookup(), it misunderstands that the 'not found' check was
successful and continues the insert operation using incomplete lookup path
data, causing the following crash:

 general protection fault, probably for non-canonical address
 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN
 KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
 ...
 RIP: 0010:nilfs_btree_get_nonroot_node fs/nilfs2/btree.c:418 [inline]
 RIP: 0010:nilfs_btree_prepare_insert fs/nilfs2/btree.c:1077 [inline]
 RIP: 0010:nilfs_btree_insert+0x6d3/0x1c10 fs/nilfs2/btree.c:1238
 Code: bc 24 80 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89
 ff e8 4b 02 92 fe 4d 8b 3f 49 83 c7 28 4c 89 f8 48 c1 e8 03 &lt;42&gt; 80 3c
 28 00 74 08 4c 89 ff e8 2e 02 92 fe 4d 8b 3f 49 83 c7 02
 ...
 Call Trace:
 &lt;TASK&gt;
  nilfs_bmap_do_insert fs/nilfs2/bmap.c:121 [inline]
  nilfs_bmap_insert+0x20d/0x360 fs/nilfs2/bmap.c:147
  nilfs_get_block+0x414/0x8d0 fs/nilfs2/inode.c:101
  __block_write_begin_int+0x54c/0x1a80 fs/buffer.c:1991
  __block_write_begin fs/buffer.c:2041 [inline]
  block_write_begin+0x93/0x1e0 fs/buffer.c:2102
  nilfs_write_begin+0x9c/0x110 fs/nilfs2/inode.c:261
  generic_perform_write+0x2e4/0x5e0 mm/filemap.c:3772
  __generic_file_write_iter+0x176/0x400 mm/filemap.c:3900
  generic_file_write_iter+0xab/0x310 mm/filemap.c:3932
  call_write_iter include/linux/fs.h:2186 [inline]
  new_sync_write fs/read_write.c:491 [inline]
  vfs_write+0x7dc/0xc50 fs/read_write.c:584
  ksys_write+0x177/0x2a0 fs/read_write.c:637
  do_syscall_x64 arch/x86/entry/common.c:50 [inline]
  do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 ...
 &lt;/TASK&gt;

This patch fixes the root cause of this problem by replacing the error
code that __nilfs_btree_get_block() returns on block address conversion
failure from -ENOENT to another internal code -EINVAL which means that the
b-tree metadata is corrupted.

By returning -EINVAL, it propagates without glitches, and for all relevant
b-tree operations, functions in the upper bmap layer output an error
message indicating corrupted b-tree metadata via
nilfs_bmap_convert_error(), and code -EIO will be eventually returned as
it should be.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52901" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Check endpoint is valid before dereferencing it

When the host controller is not responding, all URBs queued to all
endpoints need to be killed. This can cause a kernel panic if we
dereference an invalid endpoint.

Fix this by using xhci_get_virt_ep() helper to find the endpoint and
checking if the endpoint is valid before dereferencing it.

[233311.853271] xhci-hcd xhci-hcd.1.auto: xHCI host controller not responding, assume dead
[233311.853393] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000e8

[233311.853964] pc : xhci_hc_died+0x10c/0x270
[233311.853971] lr : xhci_hc_died+0x1ac/0x270

[233311.854077] Call trace:
[233311.854085]  xhci_hc_died+0x10c/0x270
[233311.854093]  xhci_stop_endpoint_command_watchdog+0x100/0x1a4
[233311.854105]  call_timer_fn+0x50/0x2d4
[233311.854112]  expire_timers+0xac/0x2e4
[233311.854118]  run_timer_softirq+0x300/0xabc
[233311.854127]  __do_softirq+0x148/0x528
[233311.854135]  irq_exit+0x194/0x1a8
[233311.854143]  __handle_domain_irq+0x164/0x1d0
[233311.854149]  gic_handle_irq.22273+0x10c/0x188
[233311.854156]  el1_irq+0xfc/0x1a8
[233311.854175]  lpm_cpuidle_enter+0x25c/0x418 [msm_pm]
[233311.854185]  cpuidle_enter_state+0x1f0/0x764
[233311.854194]  do_idle+0x594/0x6ac
[233311.854201]  cpu_startup_entry+0x7c/0x80
[233311.854209]  secondary_start_kernel+0x170/0x198
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52904" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52904" ref_url="https://www.suse.com/security/cve/CVE-2023-52904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate()

The subs function argument may be NULL, so do not use it before the NULL check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52904/">CVE-2023-52904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52904">CVE-2023-52904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229529">SUSE bug 1229529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52905" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix resource leakage in VF driver unbind

resources allocated like mcam entries to support the Ntuple feature
and hash tables for the tc feature are not getting freed in driver
unbind. This patch fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52906</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52906" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52906" ref_url="https://www.suse.com/security/cve/CVE-2023-52906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mpls: Fix warning during failed attribute validation

The 'TCA_MPLS_LABEL' attribute is of 'NLA_U32' type, but has a
validation type of 'NLA_VALIDATE_FUNCTION'. This is an invalid
combination according to the comment above 'struct nla_policy':

"
Meaning of `validate' field, use via NLA_POLICY_VALIDATE_FN:
   NLA_BINARY           Validation function called for the attribute.
   All other            Unused - but note that it's a union
"

This can trigger the warning [1] in nla_get_range_unsigned() when
validation of the attribute fails. Despite being of 'NLA_U32' type, the
associated 'min'/'max' fields in the policy are negative as they are
aliased by the 'validate' field.

Fix by changing the attribute type to 'NLA_BINARY' which is consistent
with the above comment and all other users of NLA_POLICY_VALIDATE_FN().
As a result, move the length validation to the validation function.

No regressions in MPLS tests:

 # ./tdc.py -f tc-tests/actions/mpls.json
 [...]
 # echo $?
 0

[1]
WARNING: CPU: 0 PID: 17743 at lib/nlattr.c:118
nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
Modules linked in:
CPU: 0 PID: 17743 Comm: syz-executor.0 Not tainted 6.1.0-rc8 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014
RIP: 0010:nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
[...]
Call Trace:
 &lt;TASK&gt;
 __netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310
 netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411
 netlink_ack_tlv_fill net/netlink/af_netlink.c:2454 [inline]
 netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506
 netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546
 rtnetlink_rcv+0x18/0x20 net/core/rtnetlink.c:6109
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0x38f/0x500 net/socket.c:2482
 ___sys_sendmsg net/socket.c:2536 [inline]
 __sys_sendmsg+0x197/0x230 net/socket.c:2565
 __do_sys_sendmsg net/socket.c:2574 [inline]
 __se_sys_sendmsg net/socket.c:2572 [inline]
 __x64_sys_sendmsg+0x42/0x50 net/socket.c:2572
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52906/">CVE-2023-52906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52906">CVE-2023-52906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229527">SUSE bug 1229527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52907</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52907" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame()

Fix a use-after-free that occurs in hcd when in_urb sent from
pn533_usb_send_frame() is completed earlier than out_urb. Its callback
frees the skb data in pn533_send_async_complete() that is used as a
transfer buffer of out_urb. Wait before sending in_urb until the
callback of out_urb is called. To modify the callback of out_urb alone,
separate the complete function of out_urb and ack_urb.

Found by a modified version of syzkaller.

BUG: KASAN: use-after-free in dummy_timer
Call Trace:
 memcpy (mm/kasan/shadow.c:65)
 dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352)
 transfer (drivers/usb/gadget/udc/dummy_hcd.c:1453)
 dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972)
 arch_static_branch (arch/x86/include/asm/jump_label.h:27)
 static_key_false (include/linux/jump_label.h:207)
 timer_expire_exit (include/trace/events/timer.h:127)
 call_timer_fn (kernel/time/timer.c:1475)
 expire_timers (kernel/time/timer.c:1519)
 __run_timers (kernel/time/timer.c:1790)
 run_timer_softirq (kernel/time/timer.c:1803)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52908" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52908" ref_url="https://www.suse.com/security/cve/CVE-2023-52908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential NULL dereference

Fix potential NULL dereference, in the case when "man", the resource manager
might be NULL, when/if we print debug information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52908/">CVE-2023-52908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52908">CVE-2023-52908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229525">SUSE bug 1229525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52909</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52909" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52909" ref_url="https://www.suse.com/security/cve/CVE-2023-52909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix handling of cached open files in nfsd4_open codepath

Commit fb70bf124b05 ("NFSD: Instantiate a struct file when creating a
regular NFSv4 file") added the ability to cache an open fd over a
compound. There are a couple of problems with the way this currently
works:

It's racy, as a newly-created nfsd_file can end up with its PENDING bit
cleared while the nf is hashed, and the nf_file pointer is still zeroed
out. Other tasks can find it in this state and they expect to see a
valid nf_file, and can oops if nf_file is NULL.

Also, there is no guarantee that we'll end up creating a new nfsd_file
if one is already in the hash. If an extant entry is in the hash with a
valid nf_file, nfs4_get_vfs_file will clobber its nf_file pointer with
the value of op_file and the old nf_file will leak.

Fix both issues by making a new nfsd_file_acquirei_opened variant that
takes an optional file pointer. If one is present when this is called,
we'll take a new reference to it instead of trying to open the file. If
the nfsd_file already has a valid nf_file, we'll just ignore the
optional file and pass the nfsd_file back as-is.

Also rework the tracepoints a bit to allow for an "opened" variant and
don't try to avoid counting acquisitions in the case where we already
have a cached open file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52909/">CVE-2023-52909 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52909">CVE-2023-52909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229524">SUSE bug 1229524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52910</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52910" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52910" ref_url="https://www.suse.com/security/cve/CVE-2023-52910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/iova: Fix alloc iova overflows issue

In __alloc_and_insert_iova_range, there is an issue that retry_pfn
overflows. The value of iovad-&gt;anchor.pfn_hi is ~0UL, then when
iovad-&gt;cached_node is iovad-&gt;anchor, curr_iova-&gt;pfn_hi + 1 will
overflow. As a result, if the retry logic is executed, low_pfn is
updated to 0, and then new_pfn &lt; low_pfn returns false to make the
allocation successful.

This issue occurs in the following two situations:
1. The first iova size exceeds the domain size. When initializing
iova domain, iovad-&gt;cached_node is assigned as iovad-&gt;anchor. For
example, the iova domain size is 10M, start_pfn is 0x1_F000_0000,
and the iova size allocated for the first time is 11M. The
following is the log information, new-&gt;pfn_lo is smaller than
iovad-&gt;cached_node.

Example log as follows:
[  223.798112][T1705487] sh: [name:iova&amp;]__alloc_and_insert_iova_range
start_pfn:0x1f0000,retry_pfn:0x0,size:0xb00,limit_pfn:0x1f0a00
[  223.799590][T1705487] sh: [name:iova&amp;]__alloc_and_insert_iova_range
success start_pfn:0x1f0000,new-&gt;pfn_lo:0x1efe00,new-&gt;pfn_hi:0x1f08ff

2. The node with the largest iova-&gt;pfn_lo value in the iova domain
is deleted, iovad-&gt;cached_node will be updated to iovad-&gt;anchor,
and then the alloc iova size exceeds the maximum iova size that can
be allocated in the domain.

After judging that retry_pfn is less than limit_pfn, call retry_pfn+1
to fix the overflow issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52910/">CVE-2023-52910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52910">CVE-2023-52910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229523">SUSE bug 1229523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52911</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52911" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: another fix for the headless Adreno GPU

Fix another oops reproducible when rebooting the board with the Adreno
GPU working in the headless mode (e.g. iMX platforms).

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read
[00000000] *pgd=74936831, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#1] ARM
CPU: 0 PID: 51 Comm: reboot Not tainted 6.2.0-rc1-dirty #11
Hardware name: Freescale i.MX53 (Device Tree Support)
PC is at msm_atomic_commit_tail+0x50/0x970
LR is at commit_tail+0x9c/0x188
pc : [&lt;c06aa430&gt;]    lr : [&lt;c067a214&gt;]    psr: 600e0013
sp : e0851d30  ip : ee4eb7eb  fp : 00090acc
r10: 00000058  r9 : c2193014  r8 : c4310000
r7 : c4759380  r6 : 07bef61d  r5 : 00000000  r4 : 00000000
r3 : c44cc440  r2 : 00000000  r1 : 00000000  r0 : 00000000
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
Control: 10c5387d  Table: 74910019  DAC: 00000051
Register r0 information: NULL pointer
Register r1 information: NULL pointer
Register r2 information: NULL pointer
Register r3 information: slab kmalloc-1k start c44cc400 pointer offset 64 size 1024
Register r4 information: NULL pointer
Register r5 information: NULL pointer
Register r6 information: non-paged memory
Register r7 information: slab kmalloc-128 start c4759380 pointer offset 0 size 128
Register r8 information: slab kmalloc-2k start c4310000 pointer offset 0 size 2048
Register r9 information: non-slab/vmalloc memory
Register r10 information: non-paged memory
Register r11 information: non-paged memory
Register r12 information: non-paged memory
Process reboot (pid: 51, stack limit = 0xc80046d9)
Stack: (0xe0851d30 to 0xe0852000)
1d20:                                     c4759380 fbd77200 000005ff 002b9c70
1d40: c4759380 c4759380 00000000 07bef61d 00000600 c0d6fe7c c2193014 00000058
1d60: 00090acc c067a214 00000000 c4759380 c4310000 00000000 c44cc854 c067a89c
1d80: 00000000 00000000 00000000 c4310468 00000000 c4759380 c4310000 c4310468
1da0: c4310470 c0643258 c4759380 00000000 00000000 c0c4ee24 00000000 c44cc810
1dc0: 00000000 c0c4ee24 00000000 c44cc810 00000000 0347d2a8 e0851e00 e0851e00
1de0: c4759380 c067ad20 c4310000 00000000 c44cc810 c27f8718 c44cc854 c067adb8
1e00: c4933000 00000002 00000001 00000000 00000000 c2130850 00000000 c2130854
1e20: c25fc488 00000000 c0ff162c 00000000 00000001 00000002 00000000 00000000
1e40: c43102c0 c43102c0 00000000 0347d2a8 c44cc810 c44cc814 c2133da8 c06d1a60
1e60: 00000000 00000000 00079028 c2012f24 fee1dead c4933000 00000058 c01431e4
1e80: 01234567 c0143a20 00000000 00000000 00000000 00000000 00000000 00000000
1ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f80: 00000000 00000000 00000000 0347d2a8 00000002 00000004 00000078 00000058
1fa0: c010028c c0100060 00000002 00000004 fee1dead 28121969 01234567 00079028
1fc0: 00000002 00000004 00000078 00000058 0002fdc5 00000000 00000000 00090acc
1fe0: 00000058 becc9c64 b6e97e05 b6e0e5f6 600e0030 fee1dead 00000000 00000000
 msm_atomic_commit_tail from commit_tail+0x9c/0x188
 commit_tail from drm_atomic_helper_commit+0x160/0x188
 drm_atomic_helper_commit from drm_atomic_commit+0xac/0xe0
 drm_atomic_commit from drm_atomic_helper_disable_all+0x1b0/0x1c0
 drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x88/0x140
 drm_atomic_helper_shutdown from device_shutdown+0x16c/0x240
 device_shutdown from kernel_restart+0x38/0x90
 kernel_restart from __do_sys_reboot+0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52912" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52912" ref_url="https://www.suse.com/security/cve/CVE-2023-52912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fixed bug on error when unloading amdgpu

Fixed bug on error when unloading amdgpu.

The error message is as follows:
[  377.706202] kernel BUG at drivers/gpu/drm/drm_buddy.c:278!
[  377.706215] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[  377.706222] CPU: 4 PID: 8610 Comm: modprobe Tainted: G          IOE      6.0.0-thomas #1
[  377.706231] Hardware name: ASUS System Product Name/PRIME Z390-A, BIOS 2004 11/02/2021
[  377.706238] RIP: 0010:drm_buddy_free_block+0x26/0x30 [drm_buddy]
[  377.706264] Code: 00 00 00 90 0f 1f 44 00 00 48 8b 0e 89 c8 25 00 0c 00 00 3d 00 04 00 00 75 10 48 8b 47 18 48 d3 e0 48 01 47 28 e9 fa fe ff ff &lt;0f&gt; 0b 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41 54 55 48 89 f5 53
[  377.706282] RSP: 0018:ffffad2dc4683cb8 EFLAGS: 00010287
[  377.706289] RAX: 0000000000000000 RBX: ffff8b1743bd5138 RCX: 0000000000000000
[  377.706297] RDX: ffff8b1743bd5160 RSI: ffff8b1743bd5c78 RDI: ffff8b16d1b25f70
[  377.706304] RBP: ffff8b1743bd59e0 R08: 0000000000000001 R09: 0000000000000001
[  377.706311] R10: ffff8b16c8572400 R11: ffffad2dc4683cf0 R12: ffff8b16d1b25f70
[  377.706318] R13: ffff8b16d1b25fd0 R14: ffff8b1743bd59c0 R15: ffff8b16d1b25f70
[  377.706325] FS:  00007fec56c72c40(0000) GS:ffff8b1836500000(0000) knlGS:0000000000000000
[  377.706334] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  377.706340] CR2: 00007f9b88c1ba50 CR3: 0000000110450004 CR4: 00000000003706e0
[  377.706347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  377.706354] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  377.706361] Call Trace:
[  377.706365]  &lt;TASK&gt;
[  377.706369]  drm_buddy_free_list+0x2a/0x60 [drm_buddy]
[  377.706376]  amdgpu_vram_mgr_fini+0xea/0x180 [amdgpu]
[  377.706572]  amdgpu_ttm_fini+0x12e/0x1a0 [amdgpu]
[  377.706650]  amdgpu_bo_fini+0x22/0x90 [amdgpu]
[  377.706727]  gmc_v11_0_sw_fini+0x26/0x30 [amdgpu]
[  377.706821]  amdgpu_device_fini_sw+0xa1/0x3c0 [amdgpu]
[  377.706897]  amdgpu_driver_release_kms+0x12/0x30 [amdgpu]
[  377.706975]  drm_dev_release+0x20/0x40 [drm]
[  377.707006]  release_nodes+0x35/0xb0
[  377.707014]  devres_release_all+0x8b/0xc0
[  377.707020]  device_unbind_cleanup+0xe/0x70
[  377.707027]  device_release_driver_internal+0xee/0x160
[  377.707033]  driver_detach+0x44/0x90
[  377.707039]  bus_remove_driver+0x55/0xe0
[  377.707045]  pci_unregister_driver+0x3b/0x90
[  377.707052]  amdgpu_exit+0x11/0x6c [amdgpu]
[  377.707194]  __x64_sys_delete_module+0x142/0x2b0
[  377.707201]  ? fpregs_assert_state_consistent+0x22/0x50
[  377.707208]  ? exit_to_user_mode_prepare+0x3e/0x190
[  377.707215]  do_syscall_64+0x38/0x90
[  377.707221]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52912/">CVE-2023-52912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52912">CVE-2023-52912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229588">SUSE bug 1229588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52913" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52913" ref_url="https://www.suse.com/security/cve/CVE-2023-52913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix potential context UAFs

gem_context_register() makes the context visible to userspace, and which
point a separate thread can trigger the I915_GEM_CONTEXT_DESTROY ioctl.
So we need to ensure that nothing uses the ctx ptr after this.  And we
need to ensure that adding the ctx to the xarray is the *last* thing
that gem_context_register() does with the ctx pointer.

[tursulin: Stable and fixes tags add/tidy.]
(cherry picked from commit bed4b455cf5374e68879be56971c1da563bcd90c)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52913/">CVE-2023-52913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52913">CVE-2023-52913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229521">SUSE bug 1229521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer

In af9035_i2c_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach af9035_i2c_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.

Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230270">SUSE bug 1230270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: aspeed: Fix memory overwrite if timing is 1600x900

When capturing 1600x900, system could crash when system memory usage is
tight.

The way to reproduce this issue:
1. Use 1600x900 to display on host
2. Mount ISO through 'Virtual media' on OpenBMC's web
3. Run script as below on host to do sha continuously
  #!/bin/bash
  while [ [1] ];
  do
	find /media -type f -printf '"%h/%f"\n' | xargs sha256sum
  done
4. Open KVM on OpenBMC's web

The size of macro block captured is 8x8. Therefore, we should make sure
the height of src-buf is 8 aligned to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230269">SUSE bug 1230269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52917</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52917" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()

The debugfs_create_dir() function returns error pointers.
It never returns NULL. So use IS_ERR() to check it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231849">SUSE bug 1231849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52918" ref_url="https://www.suse.com/security/cve/CVE-2023-52918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pci: cx23885: check cx23885_vdev_init() return

cx23885_vdev_init() can return a NULL pointer, but that pointer
is used in the next line without a check.

Add a NULL pointer check and go to the error unwind if it is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52918/">CVE-2023-52918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232047">SUSE bug 1232047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52919" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: fix possible NULL pointer dereference in send_acknowledge()

Handle memory allocation failure from nci_skb_alloc() (calling
alloc_skb()) to avoid possible NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52921" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52921" ref_url="https://www.suse.com/security/cve/CVE-2023-52921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix possible UAF in amdgpu_cs_pass1()

Since the gang_size check is outside of chunk parsing
loop, we need to reset i before we free the chunk data.

Suggested by Ye Zhang (@VAR10CK) of Baidu Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52921/">CVE-2023-52921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52921">CVE-2023-52921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233452">SUSE bug 1233452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52922</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Fix UAF in bcm_proc_show()

BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80
Read of size 8 at addr ffff888155846230 by task cat/7862

CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xd5/0x150
 print_report+0xc1/0x5e0
 kasan_report+0xba/0xf0
 bcm_proc_show+0x969/0xa80
 seq_read_iter+0x4f6/0x1260
 seq_read+0x165/0x210
 proc_reg_read+0x227/0x300
 vfs_read+0x1d5/0x8d0
 ksys_read+0x11e/0x240
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Allocated by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_kmalloc+0x9e/0xa0
 bcm_sendmsg+0x264b/0x44e0
 sock_sendmsg+0xda/0x180
 ____sys_sendmsg+0x735/0x920
 ___sys_sendmsg+0x11d/0x1b0
 __sys_sendmsg+0xfa/0x1d0
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 ____kasan_slab_free+0x161/0x1c0
 slab_free_freelist_hook+0x119/0x220
 __kmem_cache_free+0xb4/0x2e0
 rcu_core+0x809/0x1bd0

bcm_op is freed before procfs entry be removed in bcm_release(),
this lead to bcm_proc_show() may read the freed bcm_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5344</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5344" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5344" ref_url="https://www.suse.com/security/cve/CVE-2023-5344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5344/">CVE-2023-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215940">SUSE bug 1215940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5345</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.

In case of an error in smb3_fs_context_parse_param, ctx-&gt;password was freed but the field was not set to NULL which could lead to double free.

We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215899">SUSE bug 1215899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215971">SUSE bug 1215971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800974" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800975" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5388</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:2564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:2684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877772" comment="libfreebl3-3.101.2-150400.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151498" comment="libfreebl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877773" comment="libsoftokn3-3.101.2-150400.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151499" comment="libsoftokn3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877774" comment="mozilla-nss-3.101.2-150400.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151500" comment="mozilla-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877775" comment="mozilla-nss-certs-3.101.2-150400.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151501" comment="mozilla-nss-certs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877776" comment="mozilla-nss-tools-3.101.2-150400.3.48.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151503" comment="mozilla-nss-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5441</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5441" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5441" ref_url="https://www.suse.com/security/cve/CVE-2023-5441" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5441/">CVE-2023-5441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216001">SUSE bug 1216001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5535" ref_url="https://www.suse.com/security/cve/CVE-2023-5535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017239.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to v9.0.2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5535/">CVE-2023-5535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216167">SUSE bug 1216167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217023">SUSE bug 1217023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009812852" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5633</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5633" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
    <description>
    The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216645">SUSE bug 1216645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5678</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV/#L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017499.html" source="SUSE-SU"/>
    <description>
    Issue summary: Generating excessively long X9.42 DH keys or checking
excessively long X9.42 DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_generate_key() to
generate an X9.42 DH key may experience long delays.  Likewise, applications
that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.

While DH_check() performs all the necessary checks (as of CVE-2023-3817),
DH_check_pub_key() doesn't make any of these checks, and is therefore
vulnerable for excessively large P and Q parameters.

Likewise, while DH_generate_key() performs a check for an excessively large
P, it doesn't check for an excessively large Q.

An application that calls DH_generate_key() or DH_check_pub_key() and
supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

DH_generate_key() and DH_check_pub_key() are also called by a number of
other OpenSSL functions.  An application calling any of those other
functions may similarly be affected.  The other functions affected by this
are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().

Also vulnerable are the OpenSSL pkey command line application when using the
"-pubcheck" option, as well as the OpenSSL genpkey command line application.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217151">SUSE bug 1217151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219091">SUSE bug 1219091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219092">SUSE bug 1219092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219415">SUSE bug 1219415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219417">SUSE bug 1219417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219712">SUSE bug 1219712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220016">SUSE bug 1220016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810703" comment="libopenssl-1_1-devel-1.1.1l-150500.17.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810704" comment="libopenssl1_1-1.1.1l-150500.17.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810705" comment="libopenssl1_1-hmac-1.1.1l-150500.17.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009810706" comment="openssl-1_1-1.1.1l-150500.17.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5717</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.

If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.

We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216644">SUSE bug 1216644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217557">SUSE bug 1217557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219697">SUSE bug 1219697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-29"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217277">SUSE bug 1217277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814270" comment="gnutls-3.7.3-150400.4.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814271" comment="libgnutls30-3.7.3-150400.4.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814272" comment="libgnutls30-hmac-3.7.3-150400.4.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5992</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5992" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1402-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018599.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219386">SUSE bug 1219386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009856057" comment="opensc-0.22.0-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218209">SUSE bug 1218209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6040</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6121</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6176</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217522">SUSE bug 1217522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814969" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009814970" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6270</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218813">SUSE bug 1218813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227675">SUSE bug 1227675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6356</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218487">SUSE bug 1218487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6536</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222685">SUSE bug 1222685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
    <description>
    An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.

The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-08-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224879">SUSE bug 1224879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225185">SUSE bug 1225185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851284" comment="libpython3_6m1_0-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851285" comment="python3-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851286" comment="python3-base-3.6.15-150300.10.57.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6606</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6683</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6683" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218889">SUSE bug 1218889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857841" comment="qemu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857819" comment="qemu-accel-tcg-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857820" comment="qemu-arm-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857842" comment="qemu-audio-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857843" comment="qemu-block-curl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857844" comment="qemu-chardev-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857845" comment="qemu-guest-agent-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857846" comment="qemu-hw-display-qxl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857847" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857848" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857849" comment="qemu-hw-usb-redirect-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857772" comment="qemu-ipxe-1.0.0+-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857832" comment="qemu-s390x-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857780" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857781" comment="qemu-sgabios-8-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857850" comment="qemu-tools-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857851" comment="qemu-ui-opengl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857852" comment="qemu-ui-spice-core-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857790" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857837" comment="qemu-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019428.html" source="SUSE-SU"/>
    <description>
    A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218484">SUSE bug 1218484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853099" comment="qemu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852955" comment="qemu-accel-tcg-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852956" comment="qemu-arm-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853100" comment="qemu-audio-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853101" comment="qemu-block-curl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853102" comment="qemu-chardev-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853103" comment="qemu-guest-agent-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853104" comment="qemu-hw-display-qxl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853105" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853106" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853107" comment="qemu-hw-usb-redirect-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852795" comment="qemu-ipxe-1.0.0+-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852968" comment="qemu-s390x-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852803" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852804" comment="qemu-sgabios-8-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853108" comment="qemu-tools-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853109" comment="qemu-ui-opengl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853110" comment="qemu-ui-spice-core-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852813" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852973" comment="qemu-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218186">SUSE bug 1218186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819387" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698027" comment="libssh-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819388" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151772" comment="libssh4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.

A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().

We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214158">SUSE bug 1214158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017889.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.

A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.

We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218255">SUSE bug 1218255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819898" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819899" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019374.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218297">SUSE bug 1218297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941349" comment="libsystemd0-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941350" comment="libudev1-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941351" comment="systemd-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941352" comment="systemd-container-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941353" comment="systemd-journal-remote-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625973" comment="systemd-journal-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941354" comment="systemd-sysvinit-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151697" comment="systemd-sysvinit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941355" comment="udev-249.17-150400.8.43.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7042</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue could be exploited to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227675">SUSE bug 1227675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7207</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0305-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0305-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018137.html" source="SUSE-SU"/>
    <description>
    Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-27"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009845234" comment="cpio-2.13-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151389" comment="cpio is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7256</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7256" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7256" ref_url="https://www.suse.com/security/cve/CVE-2023-7256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019544.html" source="SUSE-SU"/>
    <description>
    In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns.  This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block.  A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7256/">CVE-2023-7256 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230020">SUSE bug 1230020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942412" comment="libpcap1-1.10.1-150400.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0074</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0074" ref_url="https://www.suse.com/security/cve/CVE-2024-0074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018095.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0074/">CVE-2024-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0074">CVE-2024-0074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220552">SUSE bug 1220552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849752" comment="kernel-firmware-nvidia-gspx-G06-550.54.14-150500.11.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849758" comment="nvidia-open-driver-G06-signed-kmp-default-550.54.14_k5.14.21_150500.55.49-150500.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0075</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0075" ref_url="https://www.suse.com/security/cve/CVE-2024-0075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018095.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user may cause a NULL-pointer dereference by accessing passed parameters the validity of which has not been checked. A successful exploit of this vulnerability may lead to denial of service and limited information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0075/">CVE-2024-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0075">CVE-2024-0075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849752" comment="kernel-firmware-nvidia-gspx-G06-550.54.14-150500.11.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849758" comment="nvidia-open-driver-G06-signed-kmp-default-550.54.14_k5.14.21_150500.55.49-150500.3.36.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036081.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223356">SUSE bug 1223356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865381" comment="kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865387" comment="nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0091</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0091" ref_url="https://www.suse.com/security/cve/CVE-2024-0091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036081.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0091/">CVE-2024-0091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0091">CVE-2024-0091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223356">SUSE bug 1223356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865381" comment="kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865387" comment="nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0092</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0092" ref_url="https://www.suse.com/security/cve/CVE-2024-0092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036081.html" source="SUSE-SU"/>
    <description>
    NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0092/">CVE-2024-0092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0092">CVE-2024-0092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223356">SUSE bug 1223356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865381" comment="kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809873" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865387" comment="nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009809879" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0340</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218689">SUSE bug 1218689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0397</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    A defect was discovered in the Python "ssl" module where there is a memory
race condition with the ssl.SSLContext methods "cert_store_stats()" and
"get_ca_certs()". The race condition can be triggered if the methods are
called at the same time as certificates are loaded into the SSLContext,
such as during the TLS handshake with a certificate directory configured.
This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226447">SUSE bug 1226447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0450</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9192" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
    <description>
    An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.

The zipfile module is vulnerable to "quoted-overlap" zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0553</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0638-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849010" comment="gnutls-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849011" comment="libgnutls30-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849012" comment="libgnutls30-hmac-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0565</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219078">SUSE bug 1219078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0638-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218862">SUSE bug 1218862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849010" comment="gnutls-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849011" comment="libgnutls30-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009849012" comment="libgnutls30-hmac-3.7.3-150400.4.41.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The issue is in the nft_byteorder_eval() function, where the code iterates through a loop and writes to the `dst` array. On each iteration, 8 bytes are written, but `dst` is an array of u32, so each element only has space for 4 bytes. That means every iteration overwrites part of the previous element corrupting this array of u32. This flaw allows a local user to cause a denial of service or potentially break NetFilter functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0639</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0639" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability due to a deadlock was found in sctp_auto_asconf_init in net/sctp/socket.c in the Linux kernel's SCTP subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0641</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel's TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018143.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848195" comment="libopenssl-1_1-devel-1.1.1l-150500.17.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848196" comment="libopenssl1_1-1.1.1l-150500.17.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848197" comment="libopenssl1_1-hmac-1.1.1l-150500.17.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848198" comment="openssl-1_1-1.1.1l-150500.17.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219082">SUSE bug 1219082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018865.html" source="SUSE-SU"/>
    <description>
    A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219217">SUSE bug 1219217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858055" comment="openCryptoki-3.23.0-150500.3.3.13 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857998" comment="openCryptoki is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.

We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219432">SUSE bug 1219432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1086</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219435">SUSE bug 1219435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226066">SUSE bug 1226066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11053</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4284-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020021.html" source="SUSE-SU"/>
    <description>
    When asked to both use a `.netrc` file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.

This flaw only manifests itself if the netrc file has an entry that matches
the redirect target hostname but the entry either omits just the password or
omits both login and password.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234068">SUSE bug 1234068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958511" comment="curl-8.0.1-150400.5.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958512" comment="libcurl4-8.0.1-150400.5.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11168</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10779" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000637.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14508-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2HCTIBVAOGECETVMI4RBFWZPH6DY5N6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEJNNKXKTAJNDYH5NTOP4ZQCJ6DHJQWE/" source="SUSE-SU"/>
    <description>
    The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956787" comment="libpython3_6m1_0-3.6.15-150300.10.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956788" comment="python3-3.6.15-150300.10.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956789" comment="python3-base-3.6.15-150300.10.78.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1151</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1298</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1298" ref_url="https://www.suse.com/security/cve/CVE-2024-1298" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020023.html" source="SUSE-SU"/>
    <description>
    EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-29"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1298/">CVE-2024-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1298">CVE-2024-1298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225889">SUSE bug 1225889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955258" comment="qemu-ovmf-x86_64-202208-150500.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231460" comment="qemu-ovmf-x86_64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955261" comment="qemu-uefi-aarch64-202208-150500.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623392" comment="qemu-uefi-aarch64 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1441</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1441" ref_url="https://www.suse.com/security/cve/CVE-2024-1441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
    <description>
    An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1441/">CVE-2024-1441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1441">CVE-2024-1441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221237">SUSE bug 1221237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853081" comment="libvirt-client-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853082" comment="libvirt-daemon-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853083" comment="libvirt-daemon-driver-interface-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853084" comment="libvirt-daemon-driver-network-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853085" comment="libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853086" comment="libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853087" comment="libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853088" comment="libvirt-daemon-driver-secret-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853089" comment="libvirt-daemon-driver-storage-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853090" comment="libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853091" comment="libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853092" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853093" comment="libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853094" comment="libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853095" comment="libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852745" comment="libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853096" comment="libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853097" comment="libvirt-daemon-qemu-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853098" comment="libvirt-libs-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853334" comment="podman-4.8.3-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853335" comment="podman-docker-4.8.3-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853336" comment="podman-remote-4.8.3-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853337" comment="podmansh-4.8.3-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2004" ref_url="https://www.suse.com/security/cve/CVE-2024-2004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036553.html" source="SUSE-SU"/>
    <description>
    When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2004/">CVE-2024-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221665">SUSE bug 1221665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853567" comment="curl-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853568" comment="libcurl4-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20696</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20696" ref_url="https://www.suse.com/security/cve/CVE-2024-20696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2171-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035951.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14378-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YCGP76JWUXZIFMZWPNZW6VGRR63DPRBV/" source="SUSE-SU"/>
    <description>
    Windows libarchive Remote Code Execution Vulnerability
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-23"/>
	<updated date="2024-10-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-20696/">CVE-2024-20696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20696">CVE-2024-20696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225971">SUSE bug 1225971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225972">SUSE bug 1225972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868679" comment="libarchive13-3.5.1-150400.3.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151802" comment="libarchive13 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21626</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" source="SUSE-SU"/>
		<reference ref_id="TID000021363" ref_url="https://www.suse.com/support/kb/doc/?id=000021363" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue. 
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847023" comment="runc-1.1.12-150000.61.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21820</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21820" ref_url="https://www.suse.com/security/cve/CVE-2024-21820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I225DNN56ADWJ5PJKD55GQ2UHYK67TW4/" source="SUSE-SU"/>
    <description>
    Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21820/">CVE-2024-21820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21820">CVE-2024-21820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233313">SUSE bug 1233313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21853" ref_url="https://www.suse.com/security/cve/CVE-2024-21853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I225DNN56ADWJ5PJKD55GQ2UHYK67TW4/" source="SUSE-SU"/>
    <description>
    Improper finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel(R) Xeon(R) Processors may allow an authorized user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21853/">CVE-2024-21853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21853">CVE-2024-21853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233313">SUSE bug 1233313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2193</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2193" ref_url="https://www.suse.com/security/cve/CVE-2024-2193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
    <description>
    A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data from the CPU using race conditions to access the speculative executable code paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2193/">CVE-2024-2193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2193">CVE-2024-2193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217857">SUSE bug 1217857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852929" comment="xen-libs-4.17.3_08-150500.3.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2201</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="TID000021421" ref_url="https://www.suse.com/support/kb/doc/?id=000021421" source="SUSE-SU"/>
    <description>
    A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212111">SUSE bug 1212111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854754" comment="xen-libs-4.17.4_02-150500.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22099</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (net, bluetooth modules) allows Overflow Buffers. This vulnerability is associated with program files /net/bluetooth/rfcomm/core.C.

This issue affects Linux kernel: v2.6.12-rc2.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218722">SUSE bug 1218722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863244" comment="python3-Jinja2-2.10.1-150000.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253389" comment="python3-Jinja2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22231</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22231" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22231" ref_url="https://www.suse.com/security/cve/CVE-2024-22231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202404:15254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035156.html" source="SUSE-SU"/>
		<reference ref_id="TID000021368" ref_url="https://www.suse.com/support/kb/doc/?id=000021368" source="SUSE-SU"/>
    <description>
    Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead a malicious attacker to create an arbitrary directory on a Salt master.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22231/">CVE-2024-22231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22231">CVE-2024-22231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219430">SUSE bug 1219430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847045" comment="python3-salt-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847046" comment="salt-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847047" comment="salt-minion-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847048" comment="salt-transactional-update-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22232" ref_url="https://www.suse.com/security/cve/CVE-2024-22232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202404:15254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202404:15258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035156.html" source="SUSE-SU"/>
		<reference ref_id="TID000021368" ref_url="https://www.suse.com/support/kb/doc/?id=000021368" source="SUSE-SU"/>
    <description>
    A specially crafted url can be created which leads to a directory traversal in the salt file server.
A malicious user can read an arbitrary file from a Salt master's filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22232/">CVE-2024-22232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22232">CVE-2024-22232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219431">SUSE bug 1219431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847045" comment="python3-salt-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009174860" comment="python3-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847046" comment="salt-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847047" comment="salt-minion-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847048" comment="salt-transactional-update-3006.0-150500.4.29.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22365</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0136-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017680.html" source="SUSE-SU"/>
    <description>
    linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218475">SUSE bug 1218475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009819897" comment="pam-1.3.0-150000.6.66.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151504" comment="pam is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22667" ref_url="https://www.suse.com/security/cve/CVE-2024-22667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
    <description>
    Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22667/">CVE-2024-22667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22667">CVE-2024-22667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219581">SUSE bug 1219581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224870">SUSE bug 1224870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854821" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23307</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in Linux Linux kernel kernel on Linux, x86, ARM (md, raid, raid5 modules) allows Forced Integer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220145">SUSE bug 1220145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
    <description>
    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. Two malicious build steps running in parallel sharing the same cache mounts with subpaths could cause a race condition that can lead to files from the host system being accessible to the build container. The issue has been fixed in v0.12.5. Workarounds include, avoiding using BuildKit frontend from an untrusted source or building an untrusted Dockerfile containing cache mounts with --mount=type=cache,source=... options.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219267">SUSE bug 1219267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23652</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23652" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
    <description>
    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. A malicious BuildKit frontend or Dockerfile using RUN --mount could trick the feature that removes empty files created for the mountpoints into removing a file outside the container, from the host system. The issue has been fixed in v0.12.5. Workarounds include avoiding using BuildKit frontends from an untrusted source or building an untrusted Dockerfile containing RUN --mount feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219268">SUSE bug 1219268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23653</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23653" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:4391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0586-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020191.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XZ7QNLFOMP7ZODQGCLQFRNRPEWZELNY/" source="SUSE-SU"/>
    <description>
    BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. 

    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219438">SUSE bug 1219438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23850</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    copy_params in drivers/md/dm-ioctl.c in the Linux kernel through 6.7.1 can attempt to allocate more than INT_MAX bytes, and crash, because of a missing param_kernel-&gt;data_size check. This is related to ctl_ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23918" ref_url="https://www.suse.com/security/cve/CVE-2024-23918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I225DNN56ADWJ5PJKD55GQ2UHYK67TW4/" source="SUSE-SU"/>
    <description>
    Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23918/">CVE-2024-23918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23918">CVE-2024-23918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233313">SUSE bug 1233313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2398</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036553.html" source="SUSE-SU"/>
    <description>
    When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221667">SUSE bug 1221667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853567" comment="curl-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853568" comment="libcurl4-8.0.1-150400.5.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23984</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
    <description>
    Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230400">SUSE bug 1230400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24474</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24474" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24474" ref_url="https://www.suse.com/security/cve/CVE-2024-24474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
    <description>
    QEMU before 8.2.0 has an integer underflow, and resultant buffer overflow, via a TI command when an expected non-DMA transfer length is less than the length of the available FIFO data. This occurs in esp_do_nodma in hw/scsi/esp.c because of an underflow of async_len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24474/">CVE-2024-24474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24474">CVE-2024-24474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220134">SUSE bug 1220134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853099" comment="qemu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852955" comment="qemu-accel-tcg-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852956" comment="qemu-arm-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853100" comment="qemu-audio-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853101" comment="qemu-block-curl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853102" comment="qemu-chardev-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853103" comment="qemu-guest-agent-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853104" comment="qemu-hw-display-qxl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853105" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853106" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853107" comment="qemu-hw-usb-redirect-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852795" comment="qemu-ipxe-1.0.0+-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852968" comment="qemu-s390x-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852803" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852804" comment="qemu-sgabios-8-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853108" comment="qemu-tools-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853109" comment="qemu-ui-opengl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853110" comment="qemu-ui-spice-core-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852813" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852973" comment="qemu-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24577</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24577" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036192.html" source="SUSE-SU"/>
    <description>
    libgit2 is a portable C implementation of the Git core methods provided as a linkable library with a solid API, allowing to build Git functionality into your application. Using well-crafted inputs to `git_index_add` can cause heap corruption that could be leveraged for arbitrary code execution. There is an issue in the `has_dir_name` function in `src/libgit2/index.c`, which frees an entry that should not be freed. The freed entry is later used and overwritten with potentially bad actor-controlled data leading to controlled heap corruption. Depending on the application that uses libgit2, this could lead to arbitrary code execution. This issue has been patched in version 1.6.5 and 1.7.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219660">SUSE bug 1219660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877674" comment="git-2.35.3-150300.10.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877675" comment="git-core-2.35.3-150300.10.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877676" comment="perl-Git-2.35.3-150300.10.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627143" comment="perl-Git is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24786</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-15"/>
	<updated date="2025-01-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865822" comment="podman-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865823" comment="podman-docker-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865824" comment="podman-remote-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865825" comment="podmansh-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
    <description>
    Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.





    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847049" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009847050" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2494</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034895.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221815">SUSE bug 1221815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853081" comment="libvirt-client-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853082" comment="libvirt-daemon-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853083" comment="libvirt-daemon-driver-interface-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853084" comment="libvirt-daemon-driver-network-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853085" comment="libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853086" comment="libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853087" comment="libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853088" comment="libvirt-daemon-driver-secret-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853089" comment="libvirt-daemon-driver-storage-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853090" comment="libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853091" comment="libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853092" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853093" comment="libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853094" comment="libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853095" comment="libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852745" comment="libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853096" comment="libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853097" comment="libvirt-daemon-qemu-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853098" comment="libvirt-libs-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2496</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2496" ref_url="https://www.suse.com/security/cve/CVE-2024-2496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. This issue can occur when detaching a host interface while at the same time collecting the list of interfaces via virConnectListAllInterfaces API. This flaw could be used to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2496/">CVE-2024-2496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2496">CVE-2024-2496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221468">SUSE bug 1221468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853081" comment="libvirt-client-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853082" comment="libvirt-daemon-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853083" comment="libvirt-daemon-driver-interface-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151428" comment="libvirt-daemon-driver-interface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853084" comment="libvirt-daemon-driver-network-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853085" comment="libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853086" comment="libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853087" comment="libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853088" comment="libvirt-daemon-driver-secret-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853089" comment="libvirt-daemon-driver-storage-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853090" comment="libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853091" comment="libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853092" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853093" comment="libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853094" comment="libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853095" comment="libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852745" comment="libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161279" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853096" comment="libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853097" comment="libvirt-daemon-qemu-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853098" comment="libvirt-libs-9.0.0-150500.6.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24968</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
    <description>
    Improper finite state machines (FSMs) in hardware logic in some Intel(R) Processors may allow an privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230400">SUSE bug 1230400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24980</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24980" ref_url="https://www.suse.com/security/cve/CVE-2024-24980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24980/">CVE-2024-24980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25062</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0461-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0613-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035534.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219575">SUSE bug 1219575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848199" comment="libxml2-2-2.10.3-150500.5.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848200" comment="libxml2-tools-2.10.3-150500.5.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009848201" comment="python3-libxml2-2.10.3-150500.5.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2511</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html" source="SUSE-SU"/>
    <description>
    Issue summary: Some non-default TLS server configurations can cause unbounded
memory growth when processing TLSv1.3 sessions

Impact summary: An attacker may exploit certain server configurations to trigger
unbounded memory growth that would lead to a Denial of Service

This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is
being used (but not if early_data support is also configured and the default
anti-replay protection is in use). In this case, under certain conditions, the
session cache can get into an incorrect state and it will fail to flush properly
as it fills. The session cache will continue to grow in an unbounded manner. A
malicious client could deliberately create the scenario for this failure to
force a Denial of Service. It may also happen by accident in normal operation.

This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS
clients.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL
1.0.2 is also not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862486" comment="libopenssl-1_1-devel-1.1.1l-150500.17.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862487" comment="libopenssl1_1-1.1.1l-150500.17.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862488" comment="libopenssl1_1-hmac-1.1.1l-150500.17.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862489" comment="openssl-1_1-1.1.1l-150500.17.28.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25620</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25620" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25620" ref_url="https://www.suse.com/security/cve/CVE-2024-25620" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:4213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034885.html" source="SUSE-SU"/>
    <description>
    Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. When either the Helm client or SDK is used to save a chart whose name within the `Chart.yaml` file includes a relative path change, the chart would be saved outside its expected directory based on the changes in the relative path. The validation and linting did not detect the path changes in the name. This issue has been resolved in Helm v3.14.1. Users unable to upgrade should check all charts used by Helm for path changes in their name as found in the `Chart.yaml` file. This includes dependencies.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-25620/">CVE-2024-25620 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25620">CVE-2024-25620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219969">SUSE bug 1219969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956595" comment="helm-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718853" comment="helm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956596" comment="helm-bash-completion-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718854" comment="helm-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956597" comment="helm-fish-completion-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718855" comment="helm-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956598" comment="helm-zsh-completion-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718856" comment="helm-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1136-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035974.html" source="SUSE-SU"/>
    <description>
    c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220279">SUSE bug 1220279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853561" comment="libcares2-1.19.1-150000.3.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153706" comment="libcares2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi-&gt;leb_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219834">SUSE bug 1219834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219832">SUSE bug 1219832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25743" ref_url="https://www.suse.com/security/cve/CVE-2024-25743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-25743/">CVE-2024-25743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25743">CVE-2024-25743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223307">SUSE bug 1223307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220314">SUSE bug 1220314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25939" ref_url="https://www.suse.com/security/cve/CVE-2024-25939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
    <description>
    Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25939/">CVE-2024-25939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26147</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:4213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034885.html" source="SUSE-SU"/>
    <description>
    Helm is a package manager for Charts for Kubernetes. Versions prior to 3.14.2 contain an uninitialized variable vulnerability when Helm parses index and plugin yaml files missing expected content. When either an `index.yaml` file or a plugins `plugin.yaml` file were missing all metadata a panic would occur in Helm. In the Helm SDK, this is found when using the `LoadIndexFile` or `DownloadIndexFile` functions in the `repo` package or the `LoadDir` function in the `plugin` package. For the Helm client this impacts functions around adding a repository and all Helm functions if a malicious plugin is added as Helm inspects all known plugins on each invocation. This issue has been resolved in Helm v3.14.2. If a malicious plugin has been added which is causing all Helm client commands to panic, the malicious plugin can be manually removed from the filesystem. If using Helm SDK versions prior to 3.14.2, calls to affected functions can use `recover` to catch the panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220207">SUSE bug 1220207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956595" comment="helm-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718853" comment="helm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956596" comment="helm-bash-completion-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718854" comment="helm-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956597" comment="helm-fish-completion-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718855" comment="helm-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009956598" comment="helm-zsh-completion-3.16.3-150000.1.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718856" comment="helm-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26327</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26327" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26327" ref_url="https://www.suse.com/security/cve/CVE-2024-26327" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26327/">CVE-2024-26327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26327">CVE-2024-26327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220062">SUSE bug 1220062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853099" comment="qemu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852955" comment="qemu-accel-tcg-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852956" comment="qemu-arm-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853100" comment="qemu-audio-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853101" comment="qemu-block-curl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853102" comment="qemu-chardev-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853103" comment="qemu-guest-agent-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853104" comment="qemu-hw-display-qxl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853105" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853106" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853107" comment="qemu-hw-usb-redirect-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852795" comment="qemu-ipxe-1.0.0+-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852968" comment="qemu-s390x-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852803" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852804" comment="qemu-sgabios-8-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853108" comment="qemu-tools-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853109" comment="qemu-ui-opengl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853110" comment="qemu-ui-spice-core-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852813" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852973" comment="qemu-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26328</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26328" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26328" ref_url="https://www.suse.com/security/cve/CVE-2024-26328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c does not set NumVFs to PCI_SRIOV_TOTAL_VF, and thus interaction with hw/nvme/ctrl.c is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26328/">CVE-2024-26328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26328">CVE-2024-26328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220065">SUSE bug 1220065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853099" comment="qemu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852955" comment="qemu-accel-tcg-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852956" comment="qemu-arm-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853100" comment="qemu-audio-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853101" comment="qemu-block-curl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853102" comment="qemu-chardev-spice-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853103" comment="qemu-guest-agent-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853104" comment="qemu-hw-display-qxl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853105" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853106" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853107" comment="qemu-hw-usb-redirect-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852795" comment="qemu-ipxe-1.0.0+-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852968" comment="qemu-s390x-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852803" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852804" comment="qemu-sgabios-8-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853108" comment="qemu-tools-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853109" comment="qemu-ui-opengl-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853110" comment="qemu-ui-spice-core-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852813" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852973" comment="qemu-x86-7.1.0-150500.49.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26458</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852278" comment="krb5-1.20.1-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26461</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-11-22"/>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220771">SUSE bug 1220771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852278" comment="krb5-1.20.1-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26462</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26462" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26462" ref_url="https://www.suse.com/security/cve/CVE-2024-26462" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26462/">CVE-2024-26462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220772">SUSE bug 1220772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009852278" comment="krb5-1.20.1-150500.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between async notify and socket close

The submitting thread (one which called recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete()
so any code past that point risks touching already freed data.

Try to avoid the locking and extra flags altogether.
Have the main thread hold an extra reference, this way
we can depend solely on the atomic ref counter for
synchronization.

Don't futz with reiniting the completion, either, we are now
tightly controlling when completion fires.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26584</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: handle backlogging of crypto requests

Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our
requests to the crypto API, crypto_aead_{encrypt,decrypt} can return
 -EBUSY instead of -EINPROGRESS in valid situations. For example, when
the cryptd queue for AESNI is full (easy to trigger with an
artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued
to the backlog but still processed. In that case, the async callback
will also be called twice: first with err == -EINPROGRESS, which it
seems we can just ignore, then with err == 0.

Compared to Sabrina's original patch this version uses the new
tls_*crypt_async_wait() helpers and converts the EBUSY to
EINPROGRESS to avoid having to modify all the error handling
paths. The handling is identical.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26585</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between tx work scheduling and socket close

Similarly to previous commit, the submitting thread (recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete().
Reorder scheduling the work before calling complete().
This seems more logical in the first place, as it's
the inverse order of what the submitting thread will do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220211">SUSE bug 1220211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix stack corruption

When tc filters are first added to a net device, the corresponding local
port gets bound to an ACL group in the device. The group contains a list
of ACLs. In turn, each ACL points to a different TCAM region where the
filters are stored. During forwarding, the ACLs are sequentially
evaluated until a match is found.

One reason to place filters in different regions is when they are added
with decreasing priorities and in an alternating order so that two
consecutive filters can never fit in the same region because of their
key usage.

In Spectrum-2 and newer ASICs the firmware started to report that the
maximum number of ACLs in a group is more than 16, but the layout of the
register that configures ACL groups (PAGT) was not updated to account
for that. It is therefore possible to hit stack corruption [1] in the
rare case where more than 16 ACLs in a group are required.

Fix by limiting the maximum ACL group size to the minimum between what
the firmware reports and the maximum ACLs that fit in the PAGT register.

Add a test case to make sure the machine does not crash when this
condition is hit.

[1]
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120
[...]
 dump_stack_lvl+0x36/0x50
 panic+0x305/0x330
 __stack_chk_fail+0x15/0x20
 mlxsw_sp_acl_tcam_group_update+0x116/0x120
 mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110
 mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20
 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
 mlxsw_sp_acl_rule_add+0x47/0x240
 mlxsw_sp_flower_replace+0x1a9/0x1d0
 tc_setup_cb_add+0xdc/0x1c0
 fl_hw_replace_filter+0x146/0x1f0
 fl_change+0xc17/0x1360
 tc_new_tfilter+0x472/0xb90
 rtnetlink_rcv_msg+0x313/0x3b0
 netlink_rcv_skb+0x58/0x100
 netlink_unicast+0x244/0x390
 netlink_sendmsg+0x1e4/0x440
 ____sys_sendmsg+0x164/0x260
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xc0
 do_syscall_64+0x40/0xe0
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26589</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS

For PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off
for validation. However, variable offset ptr alu is not prohibited
for this ptr kind. So the variable offset is not checked.

The following prog is accepted:

  func#0 @0
  0: R1=ctx() R10=fp0
  0: (bf) r6 = r1                       ; R1=ctx() R6_w=ctx()
  1: (79) r7 = *(u64 *)(r6 +144)        ; R6_w=ctx() R7_w=flow_keys()
  2: (b7) r8 = 1024                     ; R8_w=1024
  3: (37) r8 /= 1                       ; R8_w=scalar()
  4: (57) r8 &amp;= 1024                    ; R8_w=scalar(smin=smin32=0,
  smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))
  5: (0f) r7 += r8
  mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1
  mark_precise: frame0: regs=r8 stack= before 4: (57) r8 &amp;= 1024
  mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1
  mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024
  6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off
  =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,
  var_off=(0x0; 0x400))
  6: (79) r0 = *(u64 *)(r7 +0)          ; R0_w=scalar()
  7: (95) exit

This prog loads flow_keys to r7, and adds the variable offset r8
to r7, and finally causes out-of-bounds access:

  BUG: unable to handle page fault for address: ffffc90014c80038
  [...]
  Call Trace:
   &lt;TASK&gt;
   bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]
   __bpf_prog_run include/linux/filter.h:651 [inline]
   bpf_prog_run include/linux/filter.h:658 [inline]
   bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]
   bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991
   bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359
   bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]
   __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475
   __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]
   __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]
   __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x63/0x6b

Fix this by rejecting ptr alu with variable offset on flow_keys.
Applying the patch rejects the program with "R7 pointer arithmetic
on flow_keys prohibited".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix re-attachment branch in bpf_tracing_prog_attach

The following case can cause a crash due to missing attach_btf:

1) load rawtp program
2) load fentry program with rawtp as target_fd
3) create tracing link for fentry program with target_fd = 0
4) repeat 3

In the end we have:

- prog-&gt;aux-&gt;dst_trampoline == NULL
- tgt_prog == NULL (because we did not provide target_fd to link_create)
- prog-&gt;aux-&gt;attach_btf == NULL (the program was loaded with attach_prog_fd=X)
- the program was loaded for tgt_prog but we have no way to find out which one

    BUG: kernel NULL pointer dereference, address: 0000000000000058
    Call Trace:
     &lt;TASK&gt;
     ? __die+0x20/0x70
     ? page_fault_oops+0x15b/0x430
     ? fixup_exception+0x22/0x330
     ? exc_page_fault+0x6f/0x170
     ? asm_exc_page_fault+0x22/0x30
     ? bpf_tracing_prog_attach+0x279/0x560
     ? btf_obj_id+0x5/0x10
     bpf_tracing_prog_attach+0x439/0x560
     __sys_bpf+0x1cf4/0x2de0
     __x64_sys_bpf+0x1c/0x30
     do_syscall_64+0x41/0xf0
     entry_SYSCALL_64_after_hwframe+0x6e/0x76

Return -EINVAL in this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26593</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: i801: Fix block process call transactions

According to the Intel datasheets, software must reset the block
buffer index twice for block process call transactions: once before
writing the outgoing data to the buffer, and once again before
reading the incoming data from the buffer.

The driver is currently missing the second reset, causing the wrong
portion of the block buffer to be read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26595</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26595" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path

When calling mlxsw_sp_acl_tcam_region_destroy() from an error path after
failing to attach the region to an ACL group, we hit a NULL pointer
dereference upon 'region-&gt;group-&gt;tcam' [1].

Fix by retrieving the 'tcam' pointer using mlxsw_sp_acl_to_tcam().

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
RIP: 0010:mlxsw_sp_acl_tcam_region_destroy+0xa0/0xd0
[...]
Call Trace:
 mlxsw_sp_acl_tcam_vchunk_get+0x88b/0xa20
 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
 mlxsw_sp_acl_rule_add+0x47/0x240
 mlxsw_sp_flower_replace+0x1a9/0x1d0
 tc_setup_cb_add+0xdc/0x1c0
 fl_hw_replace_filter+0x146/0x1f0
 fl_change+0xc17/0x1360
 tc_new_tfilter+0x472/0xb90
 rtnetlink_rcv_msg+0x313/0x3b0
 netlink_rcv_skb+0x58/0x100
 netlink_unicast+0x244/0x390
 netlink_sendmsg+0x1e4/0x440
 ____sys_sendmsg+0x164/0x260
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xc0
 do_syscall_64+0x40/0xe0
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qualcomm: rmnet: fix global oob in rmnet_policy

The variable rmnet_link_ops assign a *bigger* maxtype which leads to a
global out-of-bounds read when parsing the netlink attributes. See bug
trace below:

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:386 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600
Read of size 1 at addr ffffffff92c438d0 by task syz-executor.6/84207

CPU: 0 PID: 84207 Comm: syz-executor.6 Tainted: G                 N 6.1.0 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x8b/0xb3 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x172/0x475 mm/kasan/report.c:395
 kasan_report+0xbb/0x1c0 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:386 [inline]
 __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600
 __nla_parse+0x3e/0x50 lib/nlattr.c:697
 nla_parse_nested_deprecated include/net/netlink.h:1248 [inline]
 __rtnl_newlink+0x50a/0x1880 net/core/rtnetlink.c:3485
 rtnl_newlink+0x64/0xa0 net/core/rtnetlink.c:3594
 rtnetlink_rcv_msg+0x43c/0xd70 net/core/rtnetlink.c:6091
 netlink_rcv_skb+0x14f/0x410 net/netlink/af_netlink.c:2540
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x54e/0x800 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x930/0xe50 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0x154/0x190 net/socket.c:734
 ____sys_sendmsg+0x6df/0x840 net/socket.c:2482
 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536
 __sys_sendmsg+0xf3/0x1c0 net/socket.c:2565
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fdcf2072359
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fdcf13e3168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007fdcf219ff80 RCX: 00007fdcf2072359
RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003
RBP: 00007fdcf20bd493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fffbb8d7bdf R14: 00007fdcf13e3300 R15: 0000000000022000
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 rmnet_policy+0x30/0xe0

The buggy address belongs to the physical page:
page:0000000065bdeb3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x155243
flags: 0x200000000001000(reserved|node=0|zone=2)
raw: 0200000000001000 ffffea00055490c8 ffffea00055490c8 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffffffff92c43780: f9 f9 f9 f9 00 00 00 02 f9 f9 f9 f9 00 00 00 07
 ffffffff92c43800: f9 f9 f9 f9 00 00 00 05 f9 f9 f9 f9 06 f9 f9 f9
&gt;ffffffff92c43880: f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9
                                                 ^
 ffffffff92c43900: 00 00 00 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 f9
 ffffffff92c43980: 00 00 00 07 f9 f9 f9 f9 00 00 00 05 f9 f9 f9 f9

According to the comment of `nla_parse_nested_deprecated`, the maxtype
should be len(destination array) - 1. Hence use `IFLA_RMNET_MAX` here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220363">SUSE bug 1220363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache

There is a potential UAF scenario in the case of an LPI translation
cache hit racing with an operation that invalidates the cache, such
as a DISCARD ITS command. The root of the problem is that
vgic_its_check_cache() does not elevate the refcount on the vgic_irq
before dropping the lock that serializes refcount changes.

Have vgic_its_check_cache() raise the refcount on the returned vgic_irq
and add the corresponding decrement after queueing the interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221129">SUSE bug 1221129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pwm: Fix out-of-bounds access in of_pwm_single_xlate()

With args-&gt;args_count == 2 args-&gt;args[2] is not defined. Actually the
flags are contained in args-&gt;args[1].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220365">SUSE bug 1220365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP

If the external phy working together with phy-omap-usb2 does not implement
send_srp(), we may still attempt to call it. This can happen on an idle
Ethernet gadget triggering a wakeup for example:

configfs-gadget.g1 gadget.0: ECM Suspend
configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup
...
Unable to handle kernel NULL pointer dereference at virtual address
00000000 when execute
...
PC is at 0x0
LR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]
...
musb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]
usb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]
eth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c
dev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4
sch_direct_xmit from __dev_queue_xmit+0x334/0xd88
__dev_queue_xmit from arp_solicit+0xf0/0x268
arp_solicit from neigh_probe+0x54/0x7c
neigh_probe from __neigh_event_send+0x22c/0x47c
__neigh_event_send from neigh_resolve_output+0x14c/0x1c0
neigh_resolve_output from ip_finish_output2+0x1c8/0x628
ip_finish_output2 from ip_send_skb+0x40/0xd8
ip_send_skb from udp_send_skb+0x124/0x340
udp_send_skb from udp_sendmsg+0x780/0x984
udp_sendmsg from __sys_sendto+0xd8/0x158
__sys_sendto from ret_fast_syscall+0x0/0x58

Let's fix the issue by checking for send_srp() and set_vbus() before
calling them. For USB peripheral only cases these both could be NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: regenerate buddy after block freeing failed if under fc replay

This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant
mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on
code in mb_free_blocks(), fast commit replay can end up marking as free
blocks that are already marked as such. This causes corruption of the
buddy bitmap so we need to regenerate it in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/membarrier: reduce the ability to hammer on sys_membarrier

On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything.  So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Stop relying on userspace for info to fault in xsave buffer

Before this change, the expected size of the user space buffer was
taken from fx_sw-&gt;xstate_size. fx_sw-&gt;xstate_size can be changed
from user-space, so it is possible construct a sigreturn frame where:

 * fx_sw-&gt;xstate_size is smaller than the size required by valid bits in
   fx_sw-&gt;xfeatures.
 * user-space unmaps parts of the sigrame fpu buffer so that not all of
   the buffer required by xrstor is accessible.

In this case, xrstor tries to restore and accesses the unmapped area
which results in a fault. But fault_in_readable succeeds because buf +
fx_sw-&gt;xstate_size is within the still mapped area, so it goes back and
tries xrstor again. It will spin in this loop forever.

Instead, fault in the maximum size which can be touched by XRSTOR (taken
from fpstate-&gt;user_size).

[ dhansen: tweak subject / changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26607</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: sii902x: Fix probing race issue

A null pointer dereference crash has been observed rarely on TI
platforms using sii9022 bridge:

[   53.271356]  sii902x_get_edid+0x34/0x70 [sii902x]
[   53.276066]  sii902x_bridge_get_edid+0x14/0x20 [sii902x]
[   53.281381]  drm_bridge_get_edid+0x20/0x34 [drm]
[   53.286305]  drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]
[   53.292955]  drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]
[   53.300510]  drm_client_modeset_probe+0x1f0/0xbd4 [drm]
[   53.305958]  __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]
[   53.313611]  drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]
[   53.320039]  drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]
[   53.326401]  drm_client_register+0x5c/0xa0 [drm]
[   53.331216]  drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]
[   53.336881]  tidss_probe+0x128/0x264 [tidss]
[   53.341174]  platform_probe+0x68/0xc4
[   53.344841]  really_probe+0x188/0x3c4
[   53.348501]  __driver_probe_device+0x7c/0x16c
[   53.352854]  driver_probe_device+0x3c/0x10c
[   53.357033]  __device_attach_driver+0xbc/0x158
[   53.361472]  bus_for_each_drv+0x88/0xe8
[   53.365303]  __device_attach+0xa0/0x1b4
[   53.369135]  device_initial_probe+0x14/0x20
[   53.373314]  bus_probe_device+0xb0/0xb4
[   53.377145]  deferred_probe_work_func+0xcc/0x124
[   53.381757]  process_one_work+0x1f0/0x518
[   53.385770]  worker_thread+0x1e8/0x3dc
[   53.389519]  kthread+0x11c/0x120
[   53.392750]  ret_from_fork+0x10/0x20

The issue here is as follows:

- tidss probes, but is deferred as sii902x is still missing.
- sii902x starts probing and enters sii902x_init().
- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from
  DRM's perspective.
- sii902x calls sii902x_audio_codec_init() and
  platform_device_register_data()
- The registration of the audio platform device causes probing of the
  deferred devices.
- tidss probes, which eventually causes sii902x_bridge_get_edid() to be
  called.
- sii902x_bridge_get_edid() tries to use the i2c to read the edid.
  However, the sii902x driver has not set up the i2c part yet, leading
  to the crash.

Fix this by moving the drm_bridge_add() to the end of the
sii902x_init(), which is also at the very end of sii902x_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26610</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix a memory corruption

iwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that
if we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in
bytes, we'll write past the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221302">SUSE bug 1221302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26612</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs, fscache: Prevent Oops in fscache_put_cache()

This function dereferences "cache" and then checks if it's
IS_ERR_OR_NULL().  Check first, then dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221291">SUSE bug 1221291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26614</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: make sure init the accept_queue's spinlocks once

When I run syz's reproduction C program locally, it causes the following
issue:
pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!
WARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
Code: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7
30 20 ce 8f e8 ad 56 42 ff &lt;0f&gt; 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90
RSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900
RBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff
R10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000
R13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000
FS:  00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0
Call Trace:
&lt;IRQ&gt;
  _raw_spin_unlock (kernel/locking/spinlock.c:186)
  inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321)
  inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358)
  tcp_check_req (net/ipv4/tcp_minisocks.c:868)
  tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260)
  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205)
  ip_local_deliver_finish (net/ipv4/ip_input.c:234)
  __netif_receive_skb_one_core (net/core/dev.c:5529)
  process_backlog (./include/linux/rcupdate.h:779)
  __napi_poll (net/core/dev.c:6533)
  net_rx_action (net/core/dev.c:6604)
  __do_softirq (./arch/x86/include/asm/jump_label.h:27)
  do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)
&lt;/IRQ&gt;
&lt;TASK&gt;
  __local_bh_enable_ip (kernel/softirq.c:381)
  __dev_queue_xmit (net/core/dev.c:4374)
  ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)
  __ip_queue_xmit (net/ipv4/ip_output.c:535)
  __tcp_transmit_skb (net/ipv4/tcp_output.c:1462)
  tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469)
  tcp_rcv_state_process (net/ipv4/tcp_input.c:6657)
  tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929)
  __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968)
  release_sock (net/core/sock.c:3536)
  inet_wait_for_connect (net/ipv4/af_inet.c:609)
  __inet_stream_connect (net/ipv4/af_inet.c:702)
  inet_stream_connect (net/ipv4/af_inet.c:748)
  __sys_connect (./include/linux/file.h:45 net/socket.c:2064)
  __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070)
  do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
  RIP: 0033:0x7fa10ff05a3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89
  c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48
  RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a
  RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d
  RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003
  RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640
  R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20
&lt;/TASK&gt;

The issue triggering process is analyzed as follows:
Thread A                                       Thread B
tcp_v4_rcv	//receive ack TCP packet       inet_shutdown
  tcp_check_req                                  tcp_disconnect //disconnect sock
  ...                                              tcp_set_state(sk, TCP_CLOSE)
    inet_csk_complete_hashdance                ...
      inet_csk_reqsk_queue_add         
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix illegal rmb_desc access in SMC-D connection dump

A crash was found when dumping SMC-D connections. It can be reproduced
by following steps:

- run nginx/wrk test:
  smc_run nginx
  smc_run wrk -t 16 -c 1000 -d &lt;duration&gt; -H 'Connection: Close' &lt;URL&gt;

- continuously dump SMC-D connections in parallel:
  watch -n 1 'smcss -D'

 BUG: kernel NULL pointer dereference, address: 0000000000000030
 CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G	E      6.7.0+ #55
 RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x24/0x70
  ? page_fault_oops+0x66/0x150
  ? exc_page_fault+0x69/0x140
  ? asm_exc_page_fault+0x26/0x30
  ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
  ? __kmalloc_node_track_caller+0x35d/0x430
  ? __alloc_skb+0x77/0x170
  smc_diag_dump_proto+0xd0/0xf0 [smc_diag]
  smc_diag_dump+0x26/0x60 [smc_diag]
  netlink_dump+0x19f/0x320
  __netlink_dump_start+0x1dc/0x300
  smc_diag_handler_dump+0x6a/0x80 [smc_diag]
  ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]
  sock_diag_rcv_msg+0x121/0x140
  ? __pfx_sock_diag_rcv_msg+0x10/0x10
  netlink_rcv_skb+0x5a/0x110
  sock_diag_rcv+0x28/0x40
  netlink_unicast+0x22a/0x330
  netlink_sendmsg+0x1f8/0x420
  __sock_sendmsg+0xb0/0xc0
  ____sys_sendmsg+0x24e/0x300
  ? copy_msghdr_from_user+0x62/0x80
  ___sys_sendmsg+0x7c/0xd0
  ? __do_fault+0x34/0x160
  ? do_read_fault+0x5f/0x100
  ? do_fault+0xb0/0x110
  ? __handle_mm_fault+0x2b0/0x6c0
  __sys_sendmsg+0x4d/0x80
  do_syscall_64+0x69/0x180
  entry_SYSCALL_64_after_hwframe+0x6e/0x76

It is possible that the connection is in process of being established
when we dump it. Assumed that the connection has been registered in a
link group by smc_conn_create() but the rmb_desc has not yet been
initialized by smc_buf_create(), thus causing the illegal access to
conn-&gt;rmb_desc. So fix it by checking before dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220942">SUSE bug 1220942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26620</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26620" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/vfio-ap: always filter entire AP matrix

The vfio_ap_mdev_filter_matrix function is called whenever a new adapter or
domain is assigned to the mdev. The purpose of the function is to update
the guest's AP configuration by filtering the matrix of adapters and
domains assigned to the mdev. When an adapter or domain is assigned, only
the APQNs associated with the APID of the new adapter or APQI of the new
domain are inspected. If an APQN does not reference a queue device bound to
the vfio_ap device driver, then it's APID will be filtered from the mdev's
matrix when updating the guest's AP configuration.

Inspecting only the APID of the new adapter or APQI of the new domain will
result in passing AP queues through to a guest that are not bound to the
vfio_ap device driver under certain circumstances. Consider the following:

guest's AP configuration (all also assigned to the mdev's matrix):
14.0004
14.0005
14.0006
16.0004
16.0005
16.0006

unassign domain 4
unbind queue 16.0005
assign domain 4

When domain 4 is re-assigned, since only domain 4 will be inspected, the
APQNs that will be examined will be:
14.0004
16.0004

Since both of those APQNs reference queue devices that are bound to the
vfio_ap device driver, nothing will get filtered from the mdev's matrix
when updating the guest's AP configuration. Consequently, queue 16.0005
will get passed through despite not being bound to the driver. This
violates the linux device model requirement that a guest shall only be
given access to devices bound to the device driver facilitating their
pass-through.

To resolve this problem, every adapter and domain assigned to the mdev will
be inspected when filtering the mdev's matrix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221298">SUSE bug 1221298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224176">SUSE bug 1224176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26622</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tomoyo: fix UAF write bug in tomoyo_write_control()

Since tomoyo_write_control() updates head-&gt;write_buf when write()
of long lines is requested, we need to fetch head-&gt;write_buf after
head-&gt;io_sem is held.  Otherwise, concurrent write() requests can
cause use-after-free-write and double-free problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220828">SUSE bug 1220828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850771" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009850772" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26625</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: call sock_orphan() at release time

syzbot reported an interesting trace [1] caused by a stale sk-&gt;sk_wq
pointer in a closed llc socket.

In commit ff7b11aa481f ("net: socket: set sock-&gt;sk to NULL after
calling proto_ops::release()") Eric Biggers hinted that some protocols
are missing a sock_orphan(), we need to perform a full audit.

In net-next, I plan to clear sock-&gt;sk from sock_orphan() and
amend Eric patch to add a warning.

[1]
 BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]
 BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]
 BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]
 BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468
Read of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27

CPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0xc4/0x620 mm/kasan/report.c:488
  kasan_report+0xda/0x110 mm/kasan/report.c:601
  list_empty include/linux/list.h:373 [inline]
  waitqueue_active include/linux/wait.h:127 [inline]
  sock_def_write_space_wfree net/core/sock.c:3384 [inline]
  sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468
  skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080
  skb_release_all net/core/skbuff.c:1092 [inline]
  napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404
  e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970
  e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]
  e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801
  __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576
  napi_poll net/core/dev.c:6645 [inline]
  net_rx_action+0x956/0xe90 net/core/dev.c:6778
  __do_softirq+0x21a/0x8de kernel/softirq.c:553
  run_ksoftirqd kernel/softirq.c:921 [inline]
  run_ksoftirqd+0x31/0x60 kernel/softirq.c:913
  smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;

Allocated by task 5167:
  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  unpoison_slab_object mm/kasan/common.c:314 [inline]
  __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340
  kasan_slab_alloc include/linux/kasan.h:201 [inline]
  slab_post_alloc_hook mm/slub.c:3813 [inline]
  slab_alloc_node mm/slub.c:3860 [inline]
  kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879
  alloc_inode_sb include/linux/fs.h:3019 [inline]
  sock_alloc_inode+0x25/0x1c0 net/socket.c:308
  alloc_inode+0x5d/0x220 fs/inode.c:260
  new_inode_pseudo+0x16/0x80 fs/inode.c:1005
  sock_alloc+0x40/0x270 net/socket.c:634
  __sock_create+0xbc/0x800 net/socket.c:1535
  sock_create net/socket.c:1622 [inline]
  __sys_socket_create net/socket.c:1659 [inline]
  __sys_socket+0x14c/0x260 net/socket.c:1706
  __do_sys_socket net/socket.c:1720 [inline]
  __se_sys_socket net/socket.c:1718 [inline]
  __x64_sys_socket+0x72/0xb0 net/socket.c:1718
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Freed by task 0:
  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640
  poison_slab_object mm/kasan/common.c:241 [inline]
  __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257
  kasan_slab_free include/linux/kasan.h:184 [inline]
  slab_free_hook mm/slub.c:2121 [inlin
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221086">SUSE bug 1221086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26627</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler

Inside scsi_eh_wakeup(), scsi_host_busy() is called &amp; checked with host
lock every time for deciding if error handler kthread needs to be waken up.

This can be too heavy in case of recovery, such as:

 - N hardware queues

 - queue depth is M for each hardware queue

 - each scsi_host_busy() iterates over (N * M) tag/requests

If recovery is triggered in case that all requests are in-flight, each
scsi_eh_wakeup() is strictly serialized, when scsi_eh_wakeup() is called
for the last in-flight request, scsi_host_busy() has been run for (N * M -
1) times, and request has been iterated for (N*M - 1) * (N * M) times.

If both N and M are big enough, hard lockup can be triggered on acquiring
host lock, and it is observed on mpi3mr(128 hw queues, queue depth 8169).

Fix the issue by calling scsi_host_busy() outside the host lock. We don't
need the host lock for getting busy count because host the lock never
covers that.

[mkp: Drop unnecessary 'busy' variables pointed out by Bart]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221090">SUSE bug 1221090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26629</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix RELEASE_LOCKOWNER

The test on so_count in nfsd4_release_lockowner() is nonsense and
harmful.  Revert to using check_for_locks(), changing that to not sleep.

First: harmful.
As is documented in the kdoc comment for nfsd4_release_lockowner(), the
test on so_count can transiently return a false positive resulting in a
return of NFS4ERR_LOCKS_HELD when in fact no locks are held.  This is
clearly a protocol violation and with the Linux NFS client it can cause
incorrect behaviour.

If RELEASE_LOCKOWNER is sent while some other thread is still
processing a LOCK request which failed because, at the time that request
was received, the given owner held a conflicting lock, then the nfsd
thread processing that LOCK request can hold a reference (conflock) to
the lock owner that causes nfsd4_release_lockowner() to return an
incorrect error.

The Linux NFS client ignores that NFS4ERR_LOCKS_HELD error because it
never sends NFS4_RELEASE_LOCKOWNER without first releasing any locks, so
it knows that the error is impossible.  It assumes the lock owner was in
fact released so it feels free to use the same lock owner identifier in
some later locking request.

When it does reuse a lock owner identifier for which a previous RELEASE
failed, it will naturally use a lock_seqid of zero.  However the server,
which didn't release the lock owner, will expect a larger lock_seqid and
so will respond with NFS4ERR_BAD_SEQID.

So clearly it is harmful to allow a false positive, which testing
so_count allows.

The test is nonsense because ... well... it doesn't mean anything.

so_count is the sum of three different counts.
1/ the set of states listed on so_stateids
2/ the set of active vfs locks owned by any of those states
3/ various transient counts such as for conflicting locks.

When it is tested against '2' it is clear that one of these is the
transient reference obtained by find_lockowner_str_locked().  It is not
clear what the other one is expected to be.

In practice, the count is often 2 because there is precisely one state
on so_stateids.  If there were more, this would fail.

In my testing I see two circumstances when RELEASE_LOCKOWNER is called.
In one case, CLOSE is called before RELEASE_LOCKOWNER.  That results in
all the lock states being removed, and so the lockowner being discarded
(it is removed when there are no more references which usually happens
when the lock state is discarded).  When nfsd4_release_lockowner() finds
that the lock owner doesn't exist, it returns success.

The other case shows an so_count of '2' and precisely one state listed
in so_stateid.  It appears that the Linux client uses a separate lock
owner for each file resulting in one lock state per lock owner, so this
test on '2' is safe.  For another client it might not be safe.

So this patch changes check_for_locks() to use the (newish)
find_any_file_locked() so that it doesn't take a reference on the
nfs4_file and so never calls nfsd_file_put(), and so never sleeps.  With
this check is it safe to restore the use of check_for_locks() rather
than testing so_count against the mysterious '2'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221379">SUSE bug 1221379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26631</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work

idev-&gt;mc_ifc_count can be written over without proper locking.

Originally found by syzbot [1], fix this issue by encapsulating calls
to mld_ifc_stop_work() (and mld_gq_stop_work() for good measure) with
mutex_lock() and mutex_unlock() accordingly as these functions
should only be called with mc_lock per their declarations.

[1]
BUG: KCSAN: data-race in ipv6_mc_down / mld_ifc_work

write to 0xffff88813a80c832 of 1 bytes by task 3771 on cpu 0:
 mld_ifc_stop_work net/ipv6/mcast.c:1080 [inline]
 ipv6_mc_down+0x10a/0x280 net/ipv6/mcast.c:2725
 addrconf_ifdown+0xe32/0xf10 net/ipv6/addrconf.c:3949
 addrconf_notify+0x310/0x980
 notifier_call_chain kernel/notifier.c:93 [inline]
 raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461
 __dev_notify_flags+0x205/0x3d0
 dev_change_flags+0xab/0xd0 net/core/dev.c:8685
 do_setlink+0x9f6/0x2430 net/core/rtnetlink.c:2916
 rtnl_group_changelink net/core/rtnetlink.c:3458 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3717 [inline]
 rtnl_newlink+0xbb3/0x1670 net/core/rtnetlink.c:3754
 rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558
 netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545
 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576
 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]
 netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910
 ...

write to 0xffff88813a80c832 of 1 bytes by task 22 on cpu 1:
 mld_ifc_work+0x54c/0x7b0 net/ipv6/mcast.c:2653
 process_one_work kernel/workqueue.c:2627 [inline]
 process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2700
 worker_thread+0x525/0x730 kernel/workqueue.c:2781
 ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221630">SUSE bug 1221630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26633</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()

syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken.

Reading frag_off can only be done if we pulled enough bytes
to skb-&gt;head. Currently we might access garbage.

[1]
BUG: KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0
ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0
ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]
ip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x569/0x660 net/core/neighbour.c:1592
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137
ip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip6_output+0x323/0x610 net/ipv6/ip6_output.c:243
dst_output include/net/dst.h:451 [inline]
ip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155
ip6_send_skb net/ipv6/ip6_output.c:1952 [inline]
ip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972
rawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582
rawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920
inet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
slab_alloc_node mm/slub.c:3478 [inline]
__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517
__do_kmalloc_node mm/slab_common.c:1006 [inline]
__kmalloc_node_track_caller+0x118/0x3c0 mm/slab_common.c:1027
kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582
pskb_expand_head+0x226/0x1a00 net/core/skbuff.c:2098
__pskb_pull_tail+0x13b/0x2310 net/core/skbuff.c:2655
pskb_may_pull_reason include/linux/skbuff.h:2673 [inline]
pskb_may_pull include/linux/skbuff.h:2681 [inline]
ip6_tnl_parse_tlv_enc_lim+0x901/0xbb0 net/ipv6/ip6_tunnel.c:408
ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]
ip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x569/0x660 net/core/neighbour.c:1592
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137
ip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip6_output+0x323/0x610 net/ipv6/ip6_output.c:243
dst_output include/net/dst.h:451 [inline]
ip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155
ip6_send_skb net/ipv6/ip6_output.c:1952 [inline]
ip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972
rawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582
rawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920
inet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendms
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221647">SUSE bug 1221647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26635</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: Drop support for ETH_P_TR_802_2.

syzbot reported an uninit-value bug below. [0]

llc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2
(0x0011), and syzbot abused the latter to trigger the bug.

  write$tun(r0, &amp;(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[], @llc={@snap={0xaa, 0x1, ')', "90e5dd"}}}}, 0x16)

llc_conn_handler() initialises local variables {saddr,daddr}.mac
based on skb in llc_pdu_decode_sa()/llc_pdu_decode_da() and passes
them to __llc_lookup().

However, the initialisation is done only when skb-&gt;protocol is
htons(ETH_P_802_2), otherwise, __llc_lookup_established() and
__llc_lookup_listener() will read garbage.

The missing initialisation existed prior to commit 211ed865108e
("net: delete all instances of special processing for token ring").

It removed the part to kick out the token ring stuff but forgot to
close the door allowing ETH_P_TR_802_2 packets to sneak into llc_rcv().

Let's remove llc_tr_packet_type and complete the deprecation.

[0]:
BUG: KMSAN: uninit-value in __llc_lookup_established+0xe9d/0xf90
 __llc_lookup_established+0xe9d/0xf90
 __llc_lookup net/llc/llc_conn.c:611 [inline]
 llc_conn_handler+0x4bd/0x1360 net/llc/llc_conn.c:791
 llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206
 __netif_receive_skb_one_core net/core/dev.c:5527 [inline]
 __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5641
 netif_receive_skb_internal net/core/dev.c:5727 [inline]
 netif_receive_skb+0x58/0x660 net/core/dev.c:5786
 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
 tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002
 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x8ef/0x1490 fs/read_write.c:584
 ksys_write+0x20f/0x4c0 fs/read_write.c:637
 __do_sys_write fs/read_write.c:649 [inline]
 __se_sys_write fs/read_write.c:646 [inline]
 __x64_sys_write+0x93/0xd0 fs/read_write.c:646
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Local variable daddr created at:
 llc_conn_handler+0x53/0x1360 net/llc/llc_conn.c:783
 llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206

CPU: 1 PID: 5004 Comm: syz-executor994 Not tainted 6.6.0-syzkaller-14500-g1c41041124bd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221656">SUSE bug 1221656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26636</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: make llc_ui_sendmsg() more robust against bonding changes

syzbot was able to trick llc_ui_sendmsg(), allocating an skb with no
headroom, but subsequently trying to push 14 bytes of Ethernet header [1]

Like some others, llc_ui_sendmsg() releases the socket lock before
calling sock_alloc_send_skb().
Then it acquires it again, but does not redo all the sanity checks
that were performed.

This fix:

- Uses LL_RESERVED_SPACE() to reserve space.
- Check all conditions again after socket lock is held again.
- Do not account Ethernet header for mtu limitation.

[1]

skbuff: skb_under_panic: text:ffff800088baa334 len:1514 put:14 head:ffff0000c9c37000 data:ffff0000c9c36ff2 tail:0x5dc end:0x6c0 dev:bond0

 kernel BUG at net/core/skbuff.c:193 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6875 Comm: syz-executor.0 Not tainted 6.7.0-rc8-syzkaller-00101-g0802e17d9aca-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : skb_panic net/core/skbuff.c:189 [inline]
 pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
 lr : skb_panic net/core/skbuff.c:189 [inline]
 lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
sp : ffff800096f97000
x29: ffff800096f97010 x28: ffff80008cc8d668 x27: dfff800000000000
x26: ffff0000cb970c90 x25: 00000000000005dc x24: ffff0000c9c36ff2
x23: ffff0000c9c37000 x22: 00000000000005ea x21: 00000000000006c0
x20: 000000000000000e x19: ffff800088baa334 x18: 1fffe000368261ce
x17: ffff80008e4ed000 x16: ffff80008a8310f8 x15: 0000000000000001
x14: 1ffff00012df2d58 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000001 x10: 0000000000ff0100 x9 : e28a51f1087e8400
x8 : e28a51f1087e8400 x7 : ffff80008028f8d0 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78714
x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000089
Call trace:
  skb_panic net/core/skbuff.c:189 [inline]
  skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
  skb_push+0xf0/0x108 net/core/skbuff.c:2451
  eth_header+0x44/0x1f8 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3188 [inline]
  llc_mac_hdr_init+0x110/0x17c net/llc/llc_output.c:33
  llc_sap_action_send_xid_c+0x170/0x344 net/llc/llc_s_ac.c:85
  llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]
  llc_sap_next_state net/llc/llc_sap.c:182 [inline]
  llc_sap_state_process+0x1ec/0x774 net/llc/llc_sap.c:209
  llc_build_and_send_xid_pkt+0x12c/0x1c0 net/llc/llc_sap.c:270
  llc_ui_sendmsg+0x7bc/0xb1c net/llc/af_llc.c:997
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  sock_sendmsg+0x194/0x274 net/socket.c:767
  splice_to_socket+0x7cc/0xd58 fs/splice.c:881
  do_splice_from fs/splice.c:933 [inline]
  direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142
  splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088
  do_splice_direct+0x20c/0x348 fs/splice.c:1194
  do_sendfile+0x4bc/0xc70 fs/read_write.c:1254
  __do_sys_sendfile64 fs/read_write.c:1322 [inline]
  __se_sys_sendfile64 fs/read_write.c:1308 [inline]
  __arm64_sys_sendfile64+0x160/0x3b4 fs/read_write.c:1308
  __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]
  invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51
  el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136
  do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155
  el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678
  el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696
  el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595
Code: aa1803e6 aa1903e7 a90023f5 94792f6a (d4210000)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221659">SUSE bug 1221659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26640</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: add sanity checks to rx zerocopy

TCP rx zerocopy intent is to map pages initially allocated
from NIC drivers, not pages owned by a fs.

This patch adds to can_map_frag() these additional checks:

- Page must not be a compound one.
- page-&gt;mapping must be NULL.

This fixes the panic reported by ZhangPeng.

syzbot was able to loopback packets built with sendfile(),
mapping pages owned by an ext4 file to TCP rx zerocopy.

r3 = socket$inet_tcp(0x2, 0x1, 0x0)
mmap(&amp;(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r4, &amp;(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10)
connect$inet(r4, &amp;(0x7f00000006c0)={0x2, 0x4e24, @empty}, 0x10)
r5 = openat$dir(0xffffffffffffff9c, &amp;(0x7f00000000c0)='./file0\x00',
    0x181e42, 0x0)
fallocate(r5, 0x0, 0x0, 0x85b8)
sendfile(r4, r5, 0x0, 0x8ba0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23,
    &amp;(0x7f00000001c0)={&amp;(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0,
    0x0, 0x0, 0x0, 0x0}, &amp;(0x7f0000000440)=0x40)
r6 = openat$dir(0xffffffffffffff9c, &amp;(0x7f00000000c0)='./file0\x00',
    0x181e42, 0x0)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221650">SUSE bug 1221650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26641</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()

syzbot found __ip6_tnl_rcv() could access unitiliazed data [1].

Call pskb_inet_may_pull() to fix this, and initialize ipv6h
variable after this call as it can change skb-&gt;head.

[1]
 BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321
  ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727
  __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845
  ip6_tnl_rcv+0xce/0x100 net/ipv6/ip6_tunnel.c:888
 gre_rcv+0x143f/0x1870
  ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438
  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
  dst_input include/net/dst.h:461 [inline]
  ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5532 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5646
  netif_receive_skb_internal net/core/dev.c:5732 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5791
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
  tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2084 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x786/0x1200 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
  slab_alloc_node mm/slub.c:3478 [inline]
  kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
  __alloc_skb+0x318/0x740 net/core/skbuff.c:651
  alloc_skb include/linux/skbuff.h:1286 [inline]
  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787
  tun_alloc_skb drivers/net/tun.c:1531 [inline]
  tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2084 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x786/0x1200 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

CPU: 0 PID: 5034 Comm: syz-executor331 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221654">SUSE bug 1221654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26642</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow anonymous set with timeout flag

Anonymous sets are never used with timeout from userspace, reject this.
Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26643</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

While the rhashtable set gc runs asynchronously, a race allows it to
collect elements from anonymous sets with timeouts while it is being
released from the commit path.

Mingi Cho originally reported this issue in a different path in 6.1.x
with a pipapo set with low timeouts which is not possible upstream since
7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set
element timeout").

Fix this by setting on the dead flag for anonymous sets to skip async gc
in this case.

According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on
transaction abort"), Florian plans to accelerate abort path by releasing
objects via workqueue, therefore, this sets on the dead flag for abort
path too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26644</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't abort filesystem when attempting to snapshot deleted subvolume

If the source file descriptor to the snapshot ioctl refers to a deleted
subvolume, we get the following abort:

  BTRFS: Transaction aborted (error -2)
  WARNING: CPU: 0 PID: 833 at fs/btrfs/transaction.c:1875 create_pending_snapshot+0x1040/0x1190 [btrfs]
  Modules linked in: pata_acpi btrfs ata_piix libata scsi_mod virtio_net blake2b_generic xor net_failover virtio_rng failover scsi_common rng_core raid6_pq libcrc32c
  CPU: 0 PID: 833 Comm: t_snapshot_dele Not tainted 6.7.0-rc6 #2
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
  RIP: 0010:create_pending_snapshot+0x1040/0x1190 [btrfs]
  RSP: 0018:ffffa09c01337af8 EFLAGS: 00010282
  RAX: 0000000000000000 RBX: ffff9982053e7c78 RCX: 0000000000000027
  RDX: ffff99827dc20848 RSI: 0000000000000001 RDI: ffff99827dc20840
  RBP: ffffa09c01337c00 R08: 0000000000000000 R09: ffffa09c01337998
  R10: 0000000000000003 R11: ffffffffb96da248 R12: fffffffffffffffe
  R13: ffff99820535bb28 R14: ffff99820b7bd000 R15: ffff99820381ea80
  FS:  00007fe20aadabc0(0000) GS:ffff99827dc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000559a120b502f CR3: 00000000055b6000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? __warn+0x81/0x130
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? report_bug+0x171/0x1a0
   ? handle_bug+0x3a/0x70
   ? exc_invalid_op+0x17/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   create_pending_snapshots+0x92/0xc0 [btrfs]
   btrfs_commit_transaction+0x66b/0xf40 [btrfs]
   btrfs_mksubvol+0x301/0x4d0 [btrfs]
   btrfs_mksnapshot+0x80/0xb0 [btrfs]
   __btrfs_ioctl_snap_create+0x1c2/0x1d0 [btrfs]
   btrfs_ioctl_snap_create_v2+0xc4/0x150 [btrfs]
   btrfs_ioctl+0x8a6/0x2650 [btrfs]
   ? kmem_cache_free+0x22/0x340
   ? do_sys_openat2+0x97/0xe0
   __x64_sys_ioctl+0x97/0xd0
   do_syscall_64+0x46/0xf0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
  RIP: 0033:0x7fe20abe83af
  RSP: 002b:00007ffe6eff1360 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe20abe83af
  RDX: 00007ffe6eff23c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fe20ad16cd0
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 00007ffe6eff13c0 R14: 00007fe20ad45000 R15: 0000559a120b6d58
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
  BTRFS: error (device vdc: state A) in create_pending_snapshot:1875: errno=-2 No such entry
  BTRFS info (device vdc: state EA): forced readonly
  BTRFS warning (device vdc: state EA): Skipping commit of aborted transaction.
  BTRFS: error (device vdc: state EA) in cleanup_transaction:2055: errno=-2 No such entry

This happens because create_pending_snapshot() initializes the new root
item as a copy of the source root item. This includes the refs field,
which is 0 for a deleted subvolume. The call to btrfs_insert_root()
therefore inserts a root with refs == 0. btrfs_get_new_fs_root() then
finds the root and returns -ENOENT if refs == 0, which causes
create_pending_snapshot() to abort.

Fix it by checking the source root's refs before attempting the
snapshot, but after locking subvol_sem to avoid racing with deletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222072">SUSE bug 1222072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26645</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Ensure visibility when inserting an element into tracing_map

Running the following two commands in parallel on a multi-processor
AArch64 machine can sporadically produce an unexpected warning about
duplicate histogram entries:

 $ while true; do
     echo hist:key=id.syscall:val=hitcount &gt; \
       /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger
     cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist
     sleep 0.001
   done
 $ stress-ng --sysbadaddr $(nproc)

The warning looks as follows:

[ 2911.172474] ------------[ cut here ]------------
[ 2911.173111] Duplicates detected: 1
[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408
[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)
[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1
[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G            E      6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01
[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018
[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408
[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408
[ 2911.185310] sp : ffff8000a1513900
[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001
[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008
[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180
[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff
[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8
[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731
[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c
[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8
[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000
[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480
[ 2911.194259] Call trace:
[ 2911.194626]  tracing_map_sort_entries+0x3e0/0x408
[ 2911.195220]  hist_show+0x124/0x800
[ 2911.195692]  seq_read_iter+0x1d4/0x4e8
[ 2911.196193]  seq_read+0xe8/0x138
[ 2911.196638]  vfs_read+0xc8/0x300
[ 2911.197078]  ksys_read+0x70/0x108
[ 2911.197534]  __arm64_sys_read+0x24/0x38
[ 2911.198046]  invoke_syscall+0x78/0x108
[ 2911.198553]  el0_svc_common.constprop.0+0xd0/0xf8
[ 2911.199157]  do_el0_svc+0x28/0x40
[ 2911.199613]  el0_svc+0x40/0x178
[ 2911.200048]  el0t_64_sync_handler+0x13c/0x158
[ 2911.200621]  el0t_64_sync+0x1a8/0x1b0
[ 2911.201115] ---[ end trace 0000000000000000 ]---

The problem appears to be caused by CPU reordering of writes issued from
__tracing_map_insert().

The check for the presence of an element with a given key in this
function is:

 val = READ_ONCE(entry-&gt;val);
 if (val &amp;&amp; keys_match(key, val-&gt;key, map-&gt;key_size)) ...

The write of a new entry is:

 elt = get_free_elt(map);
 memcpy(elt-&gt;key, key, map-&gt;key_size);
 entry-&gt;val = elt;

The "memcpy(elt-&gt;key, key, map-&gt;key_size);" and "entry-&gt;val = elt;"
stores may become visible in the reversed order on another CPU. This
second CPU might then incorrectly determine that a new key doesn't match
an already present val-&gt;key and subse
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222056">SUSE bug 1222056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26646</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26646" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: hfi: Add syscore callbacks for system-wide PM

The kernel allocates a memory buffer and provides its location to the
hardware, which uses it to update the HFI table. This allocation occurs
during boot and remains constant throughout runtime.

When resuming from hibernation, the restore kernel allocates a second
memory buffer and reprograms the HFI hardware with the new location as
part of a normal boot. The location of the second memory buffer may
differ from the one allocated by the image kernel.

When the restore kernel transfers control to the image kernel, its HFI
buffer becomes invalid, potentially leading to memory corruption if the
hardware writes to it (the hardware continues to use the buffer from the
restore kernel).

It is also possible that the hardware "forgets" the address of the memory
buffer when resuming from "deep" suspend. Memory corruption may also occur
in such a scenario.

To prevent the described memory corruption, disable HFI when preparing to
suspend or hibernate. Enable it when resuming.

Add syscore callbacks to handle the package of the boot CPU (packages of
non-boot CPUs are handled via CPU offline). Syscore ops always run on the
boot CPU. Additionally, HFI only needs to be disabled during "deep" suspend
and hibernation. Syscore ops only run in these cases.

[ rjw: Comment adjustment, subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222070">SUSE bug 1222070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sr9800: Add check for usbnet_get_endpoints

Add check for usbnet_get_endpoints() and return the error if it fails
in order to transfer the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221337">SUSE bug 1221337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26654</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs

The dreamcastcard-&gt;timer could schedule the spu_dma_work and the
spu_dma_work could also arm the dreamcastcard-&gt;timer.

When the snd_pcm_substream is closing, the aica_channel will be
deallocated. But it could still be dereferenced in the worker
thread. The reason is that del_timer() will return directly
regardless of whether the timer handler is running or not and
the worker could be rescheduled in the timer handler. As a result,
the UAF bug will happen. The racy situation is shown below:

      (Thread 1)                 |      (Thread 2)
snd_aicapcm_pcm_close()          |
 ...                             |  run_spu_dma() //worker
                                 |    mod_timer()
  flush_work()                   |
  del_timer()                    |  aica_period_elapsed() //timer
  kfree(dreamcastcard-&gt;channel)  |    schedule_work()
                                 |  run_spu_dma() //worker
  ...                            |    dreamcastcard-&gt;channel-&gt; //USE

In order to mitigate this bug and other possible corner cases,
call mod_timer() conditionally in run_spu_dma(), then implement
PCM sync_stop op to cancel both the timer and worker. The sync_stop
op will be called from PCM core appropriately when needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222304">SUSE bug 1222304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26656</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free bug

The bug can be triggered by sending a single amdgpu_gem_userptr_ioctl
to the AMDGPU DRM driver on any ASICs with an invalid address and size.
The bug was reported by Joonkyo Jung &lt;joonkyoj@yonsei.ac.kr&gt;.
For example the following code:

static void Syzkaller1(int fd)
{
	struct drm_amdgpu_gem_userptr arg;
	int ret;

	arg.addr = 0xffffffffffff0000;
	arg.size = 0x80000000; /*2 Gb*/
	arg.flags = 0x7;
	ret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, &amp;arg);
}

Due to the address and size are not valid there is a failure in
amdgpu_hmm_register-&gt;mmu_interval_notifier_insert-&gt;__mmu_interval_notifier_insert-&gt;
check_shl_overflow, but we even the amdgpu_hmm_register failure we still call
amdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.
The following stack is below when the issue is reproduced when Kazan is enabled:

[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340
[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff &lt;0f&gt; 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80
[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246
[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b
[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260
[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25
[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00
[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260
[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000
[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0
[  +0.000010] Call Trace:
[  +0.000006]  &lt;TASK&gt;
[  +0.000007]  ? show_regs+0x6a/0x80
[  +0.000018]  ? __warn+0xa5/0x1b0
[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340
[  +0.000018]  ? report_bug+0x24a/0x290
[  +0.000022]  ? handle_bug+0x46/0x90
[  +0.000015]  ? exc_invalid_op+0x19/0x50
[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20
[  +0.000017]  ? kasan_save_stack+0x26/0x50
[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340
[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340
[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340
[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10
[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30
[  +0.000018]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0
[  +0.000018]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_read+0x11/0x20
[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]
[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]
[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]
[  +0.004291]  ? do_syscall_64+0x5f/0xe0
[  +0.000023]  ? srso_return_thunk+0x5/0x5f
[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]
[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]
[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004270]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]
[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]
[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]
[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222307">SUSE bug 1222307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26659</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: handle isoc Babble and Buffer Overrun events properly

xHCI 4.9 explicitly forbids assuming that the xHC has released its
ownership of a multi-TRB TD when it reports an error on one of the
early TRBs. Yet the driver makes such assumption and releases the TD,
allowing the remaining TRBs to be freed or overwritten by new TDs.

The xHC should also report completion of the final TRB due to its IOC
flag being set by us, regardless of prior errors. This event cannot
be recognized if the TD has already been freed earlier, resulting in
"Transfer event TRB DMA ptr not part of current TD" error message.

Fix this by reusing the logic for processing isoc Transaction Errors.
This also handles hosts which fail to report the final completion.

Fix transfer length reporting on Babble errors. They may be caused by
device malfunction, no guarantee that the buffer has been filled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222317">SUSE bug 1222317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Implement bounds check for stream encoder creation in DCN301

'stream_enc_regs' array is an array of dcn10_stream_enc_registers
structures. The array is initialized with four elements, corresponding
to the four calls to stream_enc_regs() in the array initializer. This
means that valid indices for this array are 0, 1, 2, and 3.

The error message 'stream_enc_regs' 4 &lt;= 5 below, is indicating that
there is an attempt to access this array with an index of 5, which is
out of bounds. This could lead to undefined behavior

Here, eng_id is used as an index to access the stream_enc_regs array. If
eng_id is 5, this would result in an out-of-bounds access on the
stream_enc_regs array.

Thus fixing Buffer overflow error in dcn301_stream_encoder_create
reported by Smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 &lt;= 5
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222266">SUSE bug 1222266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'

In "u32 otg_inst = pipe_ctx-&gt;stream_res.tg-&gt;inst;"
pipe_ctx-&gt;stream_res.tg could be NULL, it is relying on the caller to
ensure the tg is not NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222323">SUSE bug 1222323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26663</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()

syzbot reported the following general protection fault [1]:

general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]
...
RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291
...
Call Trace:
 &lt;TASK&gt;
 tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646
 tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089
 genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972
 genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]
 genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067
 netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
 netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367
 netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0xd5/0x180 net/socket.c:745
 ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
 __sys_sendmsg+0x117/0x1e0 net/socket.c:2667
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

The cause of this issue is that when tipc_nl_bearer_add() is called with
the TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called
even if the bearer is not UDP.

tipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that
the media_ptr field of the tipc_bearer has an udp_bearer type object, so
the function goes crazy for non-UDP bearers.

This patch fixes the issue by checking the bearer type before calling
tipc_udp_nl_bearer_add() in tipc_nl_bearer_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222326">SUSE bug 1222326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26664</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Fix out-of-bounds memory access

Fix a bug that pdata-&gt;cpu_map[] is set before out-of-bounds check.
The problem might be triggered on systems with more than 128 cores per
package.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222355">SUSE bug 1222355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26665</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tunnels: fix out of bounds access when building IPv6 PMTU error

If the ICMPv6 error is built from a non-linear skb we get the following
splat,

  BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240
  Read of size 4 at addr ffff88811d402c80 by task netperf/820
  CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543
  ...
   kasan_report+0xd8/0x110
   do_csum+0x220/0x240
   csum_partial+0xc/0x20
   skb_tunnel_check_pmtu+0xeb9/0x3280
   vxlan_xmit_one+0x14c2/0x4080
   vxlan_xmit+0xf61/0x5c00
   dev_hard_start_xmit+0xfb/0x510
   __dev_queue_xmit+0x7cd/0x32a0
   br_dev_queue_push_xmit+0x39d/0x6a0

Use skb_checksum instead of csum_partial who cannot deal with non-linear
SKBs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222328">SUSE bug 1222328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup

The commit 8b45a26f2ba9 ("drm/msm/dpu: reserve cdm blocks for writeback
in case of YUV output") introduced a smatch warning about another
conditional block in dpu_encoder_helper_phys_cleanup() which had assumed
hw_pp will always be valid which may not necessarily be true.

Lets fix the other conditional block by making sure hw_pp is valid
before dereferencing it.

Patchwork: https://patchwork.freedesktop.org/patch/574878/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222331">SUSE bug 1222331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26668</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_limit: reject configurations that cause integer overflow

Reject bogus configs where internal token counter wraps around.
This only occurs with very very large requests, such as 17gbyte/s.

Its better to reject this rather than having incorrect ratelimit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222335">SUSE bug 1222335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26669</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: flower: Fix chain template offload

When a qdisc is deleted from a net device the stack instructs the
underlying driver to remove its flow offload callback from the
associated filter block using the 'FLOW_BLOCK_UNBIND' command. The stack
then continues to replay the removal of the filters in the block for
this driver by iterating over the chains in the block and invoking the
'reoffload' operation of the classifier being used. In turn, the
classifier in its 'reoffload' operation prepares and emits a
'FLOW_CLS_DESTROY' command for each filter.

However, the stack does not do the same for chain templates and the
underlying driver never receives a 'FLOW_CLS_TMPLT_DESTROY' command when
a qdisc is deleted. This results in a memory leak [1] which can be
reproduced using [2].

Fix by introducing a 'tmplt_reoffload' operation and have the stack
invoke it with the appropriate arguments as part of the replay.
Implement the operation in the sole classifier that supports chain
templates (flower) by emitting the 'FLOW_CLS_TMPLT_{CREATE,DESTROY}'
command based on whether a flow offload callback is being bound to a
filter block or being unbound from one.

As far as I can tell, the issue happens since cited commit which
reordered tcf_block_offload_unbind() before tcf_block_flush_all_chains()
in __tcf_block_put(). The order cannot be reversed as the filter block
is expected to be freed after flushing all the chains.

[1]
unreferenced object 0xffff888107e28800 (size 2048):
  comm "tc", pid 1079, jiffies 4294958525 (age 3074.287s)
  hex dump (first 32 bytes):
    b1 a6 7c 11 81 88 ff ff e0 5b b3 10 81 88 ff ff  ..|......[......
    01 00 00 00 00 00 00 00 e0 aa b0 84 ff ff ff ff  ................
  backtrace:
    [&lt;ffffffff81c06a68&gt;] __kmem_cache_alloc_node+0x1e8/0x320
    [&lt;ffffffff81ab374e&gt;] __kmalloc+0x4e/0x90
    [&lt;ffffffff832aec6d&gt;] mlxsw_sp_acl_ruleset_get+0x34d/0x7a0
    [&lt;ffffffff832bc195&gt;] mlxsw_sp_flower_tmplt_create+0x145/0x180
    [&lt;ffffffff832b2e1a&gt;] mlxsw_sp_flow_block_cb+0x1ea/0x280
    [&lt;ffffffff83a10613&gt;] tc_setup_cb_call+0x183/0x340
    [&lt;ffffffff83a9f85a&gt;] fl_tmplt_create+0x3da/0x4c0
    [&lt;ffffffff83a22435&gt;] tc_ctl_chain+0xa15/0x1170
    [&lt;ffffffff838a863c&gt;] rtnetlink_rcv_msg+0x3cc/0xed0
    [&lt;ffffffff83ac87f0&gt;] netlink_rcv_skb+0x170/0x440
    [&lt;ffffffff83ac6270&gt;] netlink_unicast+0x540/0x820
    [&lt;ffffffff83ac6e28&gt;] netlink_sendmsg+0x8d8/0xda0
    [&lt;ffffffff83793def&gt;] ____sys_sendmsg+0x30f/0xa80
    [&lt;ffffffff8379d29a&gt;] ___sys_sendmsg+0x13a/0x1e0
    [&lt;ffffffff8379d50c&gt;] __sys_sendmsg+0x11c/0x1f0
    [&lt;ffffffff843b9ce0&gt;] do_syscall_64+0x40/0xe0
unreferenced object 0xffff88816d2c0400 (size 1024):
  comm "tc", pid 1079, jiffies 4294958525 (age 3074.287s)
  hex dump (first 32 bytes):
    40 00 00 00 00 00 00 00 57 f6 38 be 00 00 00 00  @.......W.8.....
    10 04 2c 6d 81 88 ff ff 10 04 2c 6d 81 88 ff ff  ..,m......,m....
  backtrace:
    [&lt;ffffffff81c06a68&gt;] __kmem_cache_alloc_node+0x1e8/0x320
    [&lt;ffffffff81ab36c1&gt;] __kmalloc_node+0x51/0x90
    [&lt;ffffffff81a8ed96&gt;] kvmalloc_node+0xa6/0x1f0
    [&lt;ffffffff82827d03&gt;] bucket_table_alloc.isra.0+0x83/0x460
    [&lt;ffffffff82828d2b&gt;] rhashtable_init+0x43b/0x7c0
    [&lt;ffffffff832aed48&gt;] mlxsw_sp_acl_ruleset_get+0x428/0x7a0
    [&lt;ffffffff832bc195&gt;] mlxsw_sp_flower_tmplt_create+0x145/0x180
    [&lt;ffffffff832b2e1a&gt;] mlxsw_sp_flow_block_cb+0x1ea/0x280
    [&lt;ffffffff83a10613&gt;] tc_setup_cb_call+0x183/0x340
    [&lt;ffffffff83a9f85a&gt;] fl_tmplt_create+0x3da/0x4c0
    [&lt;ffffffff83a22435&gt;] tc_ctl_chain+0xa15/0x1170
    [&lt;ffffffff838a863c&gt;] rtnetlink_rcv_msg+0x3cc/0xed0
    [&lt;ffffffff83ac87f0&gt;] netlink_rcv_skb+0x170/0x440
    [&lt;ffffffff83ac6270&gt;] netlink_unicast+0x540/0x820
    [&lt;ffffffff83ac6e28&gt;] netlink_sendmsg+0x8d8/0xda0
    [&lt;ffffffff83793def&gt;] ____sys_sendmsg+0x30f/0xa80

[2]
 # tc qdisc add dev swp1 clsact
 # tc chain add dev swp1 ingress proto ip chain 1 flower dst_ip 0.0.0.0/32
 # tc qdisc del dev
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222350">SUSE bug 1222350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26670" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD

Currently the ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround isn't
quite right, as it is supposed to be applied after the last explicit
memory access, but is immediately followed by an LDR.

The ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround is used to
handle Cortex-A520 erratum 2966298 and Cortex-A510 erratum 3117295,
which are described in:

* https://developer.arm.com/documentation/SDEN2444153/0600/?lang=en
* https://developer.arm.com/documentation/SDEN1873361/1600/?lang=en

In both cases the workaround is described as:

| If pagetable isolation is disabled, the context switch logic in the
| kernel can be updated to execute the following sequence on affected
| cores before exiting to EL0, and after all explicit memory accesses:
|
| 1. A non-shareable TLBI to any context and/or address, including
|    unused contexts or addresses, such as a `TLBI VALE1 Xzr`.
|
| 2. A DSB NSH to guarantee completion of the TLBI.

The important part being that the TLBI+DSB must be placed "after all
explicit memory accesses".

Unfortunately, as-implemented, the TLBI+DSB is immediately followed by
an LDR, as we have:

| alternative_if ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD
| 	tlbi	vale1, xzr
| 	dsb	nsh
| alternative_else_nop_endif
| alternative_if_not ARM64_UNMAP_KERNEL_AT_EL0
| 	ldr	lr, [sp, #S_LR]
| 	add	sp, sp, #PT_REGS_SIZE		// restore sp
| 	eret
| alternative_else_nop_endif
|
| [ ... KPTI exception return path ... ]

This patch fixes this by reworking the logic to place the TLBI+DSB
immediately before the ERET, after all explicit memory accesses.

The ERET is currently in a separate alternative block, and alternatives
cannot be nested. To account for this, the alternative block for
ARM64_UNMAP_KERNEL_AT_EL0 is replaced with a single alternative branch
to skip the KPTI logic, with the new shape of the logic being:

| alternative_insn "b .L_skip_tramp_exit_\@", nop, ARM64_UNMAP_KERNEL_AT_EL0
| 	[ ... KPTI exception return path ... ]
| .L_skip_tramp_exit_\@:
|
| 	ldr	lr, [sp, #S_LR]
| 	add	sp, sp, #PT_REGS_SIZE		// restore sp
|
| alternative_if ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD
| 	tlbi	vale1, xzr
| 	dsb	nsh
| alternative_else_nop_endif
| 	eret

The new structure means that the workaround is only applied when KPTI is
not in use; this is fine as noted in the documented implications of the
erratum:

| Pagetable isolation between EL0 and higher level ELs prevents the
| issue from occurring.

... and as per the workaround description quoted above, the workaround
is only necessary "If pagetable isolation is disabled".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222356">SUSE bug 1222356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26671</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix IO hang from sbitmap wakeup race

In blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered
with the following blk_mq_get_driver_tag() in case of getting driver
tag failure.

Then in __sbitmap_queue_wake_up(), waitqueue_active() may not observe
the added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime
blk_mq_mark_tag_wait() can't get driver tag successfully.

This issue can be reproduced by running the following test in loop, and
fio hang can be observed in &lt; 30min when running it on my test VM
in laptop.

	modprobe -r scsi_debug
	modprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4
	dev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`
	fio --filename=/dev/"$dev" --direct=1 --rw=randrw --bs=4k --iodepth=1 \
       		--runtime=100 --numjobs=40 --time_based --name=test \
        	--ioengine=libaio

Fix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which
is just fine in case of running out of tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222357">SUSE bug 1222357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26673</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations

- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
- Disallow layer 4 protocol with no ports, since destination port is a
  mandatory attribute for this object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222368">SUSE bug 1222368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26675</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp_async: limit MRU to 64K

syzbot triggered a warning [1] in __alloc_pages():

WARN_ON_ONCE_GFP(order &gt; MAX_PAGE_ORDER, gfp)

Willem fixed a similar issue in commit c0a2a1b0d631 ("ppp: limit MRU to 64K")

Adopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)

[1]:

 WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
Modules linked in:
CPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: events_unbound flush_to_ldisc
pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
 lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537
sp : ffff800093967580
x29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000
x26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0
x23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8
x20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120
x17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005
x14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000
x11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001
x8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f
x5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020
x2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0
Call trace:
  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
  __alloc_pages_node include/linux/gfp.h:238 [inline]
  alloc_pages_node include/linux/gfp.h:261 [inline]
  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926
  __do_kmalloc_node mm/slub.c:3969 [inline]
  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001
  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590
  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651
  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715
  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]
  dev_alloc_skb include/linux/skbuff.h:3248 [inline]
  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]
  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341
  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390
  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37
  receive_buf drivers/tty/tty_buffer.c:444 [inline]
  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494
  process_one_work+0x694/0x1204 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x938/0xef4 kernel/workqueue.c:2787
  kthread+0x288/0x310 kernel/kthread.c:388
  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222379">SUSE bug 1222379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26677</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26677" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26677" ref_url="https://www.suse.com/security/cve/CVE-2024-26677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix delayed ACKs to not set the reference serial number

Fix the construction of delayed ACKs to not set the reference serial number
as they can't be used as an RTT reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26677/">CVE-2024-26677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222387">SUSE bug 1222387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26679</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: read sk-&gt;sk_family once in inet_recv_error()

inet_recv_error() is called without holding the socket lock.

IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM
socket option and trigger a KCSAN warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222385">SUSE bug 1222385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26680</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: Fix DMA mapping for PTP hwts ring

Function aq_ring_hwts_rx_alloc() maps extra AQ_CFG_RXDS_DEF bytes
for PTP HWTS ring but then generic aq_ring_free() does not take this
into account.
Create and use a specific function to free HWTS ring to fix this
issue.

Trace:
[  215.351607] ------------[ cut here ]------------
[  215.351612] DMA-API: atlantic 0000:4b:00.0: device driver frees DMA memory with different size [device address=0x00000000fbdd0000] [map size=34816 bytes] [unmap size=32768 bytes]
[  215.351635] WARNING: CPU: 33 PID: 10759 at kernel/dma/debug.c:988 check_unmap+0xa6f/0x2360
...
[  215.581176] Call Trace:
[  215.583632]  &lt;TASK&gt;
[  215.585745]  ? show_trace_log_lvl+0x1c4/0x2df
[  215.590114]  ? show_trace_log_lvl+0x1c4/0x2df
[  215.594497]  ? debug_dma_free_coherent+0x196/0x210
[  215.599305]  ? check_unmap+0xa6f/0x2360
[  215.603147]  ? __warn+0xca/0x1d0
[  215.606391]  ? check_unmap+0xa6f/0x2360
[  215.610237]  ? report_bug+0x1ef/0x370
[  215.613921]  ? handle_bug+0x3c/0x70
[  215.617423]  ? exc_invalid_op+0x14/0x50
[  215.621269]  ? asm_exc_invalid_op+0x16/0x20
[  215.625480]  ? check_unmap+0xa6f/0x2360
[  215.629331]  ? mark_lock.part.0+0xca/0xa40
[  215.633445]  debug_dma_free_coherent+0x196/0x210
[  215.638079]  ? __pfx_debug_dma_free_coherent+0x10/0x10
[  215.643242]  ? slab_free_freelist_hook+0x11d/0x1d0
[  215.648060]  dma_free_attrs+0x6d/0x130
[  215.651834]  aq_ring_free+0x193/0x290 [atlantic]
[  215.656487]  aq_ptp_ring_free+0x67/0x110 [atlantic]
...
[  216.127540] ---[ end trace 6467e5964dd2640b ]---
[  216.132160] DMA-API: Mapped at:
[  216.132162]  debug_dma_alloc_coherent+0x66/0x2f0
[  216.132165]  dma_alloc_attrs+0xf5/0x1b0
[  216.132168]  aq_ring_hwts_rx_alloc+0x150/0x1f0 [atlantic]
[  216.132193]  aq_ptp_ring_alloc+0x1bb/0x540 [atlantic]
[  216.132213]  aq_nic_init+0x4a1/0x760 [atlantic]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222427">SUSE bug 1222427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26681</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: avoid potential loop in nsim_dev_trap_report_work()

Many syzbot reports include the following trace [1]

If nsim_dev_trap_report_work() can not grab the mutex,
it should rearm itself at least one jiffie later.

[1]
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 32383 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller-00031-g861c0981648f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: events nsim_dev_trap_report_work
 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:89 [inline]
 RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]
 RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]
 RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]
 RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
 RIP: 0010:kasan_check_range+0x101/0x190 mm/kasan/generic.c:189
Code: 07 49 39 d1 75 0a 45 3a 11 b8 01 00 00 00 7c 0b 44 89 c2 e8 21 ed ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 &lt;48&gt; 83 c0 01 48 39 d0 74 41 80 38 00 74 f2 eb b6 41 bc 08 00 00 00
RSP: 0018:ffffc90012dcf998 EFLAGS: 00000046
RAX: fffffbfff258af1e RBX: fffffbfff258af1f RCX: ffffffff8168eda3
RDX: fffffbfff258af1f RSI: 0000000000000004 RDI: ffffffff92c578f0
RBP: fffffbfff258af1e R08: 0000000000000000 R09: fffffbfff258af1e
R10: ffffffff92c578f3 R11: ffffffff8acbcbc0 R12: 0000000000000002
R13: ffff88806db38400 R14: 1ffff920025b9f42 R15: ffffffff92c578e8
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c00994e078 CR3: 000000002c250000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
  instrument_atomic_read include/linux/instrumented.h:68 [inline]
  atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline]
  queued_spin_is_locked include/asm-generic/qspinlock.h:57 [inline]
  debug_spin_unlock kernel/locking/spinlock_debug.c:101 [inline]
  do_raw_spin_unlock+0x53/0x230 kernel/locking/spinlock_debug.c:141
  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]
  _raw_spin_unlock_irqrestore+0x22/0x70 kernel/locking/spinlock.c:194
  debug_object_activate+0x349/0x540 lib/debugobjects.c:726
  debug_work_activate kernel/workqueue.c:578 [inline]
  insert_work+0x30/0x230 kernel/workqueue.c:1650
  __queue_work+0x62e/0x11d0 kernel/workqueue.c:1802
  __queue_delayed_work+0x1bf/0x270 kernel/workqueue.c:1953
  queue_delayed_work_on+0x106/0x130 kernel/workqueue.c:1989
  queue_delayed_work include/linux/workqueue.h:563 [inline]
  schedule_delayed_work include/linux/workqueue.h:677 [inline]
  nsim_dev_trap_report_work+0x9c0/0xc80 drivers/net/netdevsim/dev.c:842
  process_one_work+0x886/0x15d0 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x8b9/0x1290 kernel/workqueue.c:2787
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222431">SUSE bug 1222431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26684</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: xgmac: fix handling of DPP safety error for DMA channels

Commit 56e58d6c8a56 ("net: stmmac: Implement Safety Features in
XGMAC core") checks and reports safety errors, but leaves the
Data Path Parity Errors for each channel in DMA unhandled at all, lead to
a storm of interrupt.
Fix it by checking and clearing the DMA_DPP_Interrupt_Status register.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222445">SUSE bug 1222445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26685</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential bug in end_buffer_async_write

According to a syzbot report, end_buffer_async_write(), which handles the
completion of block device writes, may detect abnormal condition of the
buffer async_write flag and cause a BUG_ON failure when using nilfs2.

Nilfs2 itself does not use end_buffer_async_write().  But, the async_write
flag is now used as a marker by commit 7f42ec394156 ("nilfs2: fix issue
with race condition of competition between segments for dirty blocks") as
a means of resolving double list insertion of dirty blocks in
nilfs_lookup_dirty_data_buffers() and nilfs_lookup_node_buffers() and the
resulting crash.

This modification is safe as long as it is used for file data and b-tree
node blocks where the page caches are independent.  However, it was
irrelevant and redundant to also introduce async_write for segment summary
and super root blocks that share buffers with the backing device.  This
led to the possibility that the BUG_ON check in end_buffer_async_write
would fail as described above, if independent writebacks of the backing
device occurred in parallel.

The use of async_write for segment summary buffers has already been
removed in a previous change.

Fix this issue by removing the manipulation of the async_write flag for
the remaining super root block buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222437">SUSE bug 1222437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26687</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/events: close evtchn after mapping cleanup

shutdown_pirq and startup_pirq are not taking the
irq_mapping_update_lock because they can't due to lock inversion. Both
are called with the irq_desc-&gt;lock being taking. The lock order,
however, is first irq_mapping_update_lock and then irq_desc-&gt;lock.

This opens multiple races:
- shutdown_pirq can be interrupted by a function that allocates an event
  channel:

  CPU0                        CPU1
  shutdown_pirq {
    xen_evtchn_close(e)
                              __startup_pirq {
                                EVTCHNOP_bind_pirq
                                  -&gt; returns just freed evtchn e
                                set_evtchn_to_irq(e, irq)
                              }
    xen_irq_info_cleanup() {
      set_evtchn_to_irq(e, -1)
    }
  }

  Assume here event channel e refers here to the same event channel
  number.
  After this race the evtchn_to_irq mapping for e is invalid (-1).

- __startup_pirq races with __unbind_from_irq in a similar way. Because
  __startup_pirq doesn't take irq_mapping_update_lock it can grab the
  evtchn that __unbind_from_irq is currently freeing and cleaning up. In
  this case even though the event channel is allocated, its mapping can
  be unset in evtchn_to_irq.

The fix is to first cleanup the mappings and then close the event
channel. In this way, when an event channel gets allocated it's
potential previous evtchn_to_irq mappings are guaranteed to be unset already.
This is also the reverse order of the allocation where first the event
channel is allocated and then the mappings are setup.

On a 5.10 kernel prior to commit 3fcdaf3d7634 ("xen/events: modify internal
[un]bind interfaces"), we hit a BUG like the following during probing of NVMe
devices. The issue is that during nvme_setup_io_queues, pci_free_irq
is called for every device which results in a call to shutdown_pirq.
With many nvme devices it's therefore likely to hit this race during
boot because there will be multiple calls to shutdown_pirq and
startup_pirq are running potentially in parallel.

  ------------[ cut here ]------------
  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled
  kernel BUG at drivers/xen/events/events_base.c:499!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1
  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006
  Workqueue: nvme-reset-wq nvme_reset_work
  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0
  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff &lt;0f&gt; 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00
  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006
  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff
  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00
  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed
  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002
  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? set_affinity_irq+0xdc/0x1c0
   ? __die_body.cold+0x8/0xd
   ? die+0x2b/0x50
   ? do_trap+0x90/0x110
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? do_error_trap+0x65/0x80
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? exc_invalid_op+0x4e/0x70
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? asm_exc_invalid_op+0x12/0x20
   ? bind_evtchn_to_cpu+0xdf/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26688</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super

When configuring a hugetlb filesystem via the fsconfig() syscall, there is
a possible NULL dereference in hugetlbfs_fill_super() caused by assigning
NULL to ctx-&gt;hstate in hugetlbfs_parse_param() when the requested pagesize
is non valid.

E.g: Taking the following steps:

     fd = fsopen("hugetlbfs", FSOPEN_CLOEXEC);
     fsconfig(fd, FSCONFIG_SET_STRING, "pagesize", "1024", 0);
     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);

Given that the requested "pagesize" is invalid, ctxt-&gt;hstate will be replaced
with NULL, losing its previous value, and we will print an error:

 ...
 ...
 case Opt_pagesize:
 ps = memparse(param-&gt;string, &amp;rest);
 ctx-&gt;hstate = h;
 if (!ctx-&gt;hstate) {
         pr_err("Unsupported page size %lu MB\n", ps / SZ_1M);
         return -EINVAL;
 }
 return 0;
 ...
 ...

This is a problem because later on, we will dereference ctxt-&gt;hstate in
hugetlbfs_fill_super()

 ...
 ...
 sb-&gt;s_blocksize = huge_page_size(ctx-&gt;hstate);
 ...
 ...

Causing below Oops.

Fix this by replacing cxt-&gt;hstate value only when then pagesize is known
to be valid.

 kernel: hugetlbfs: Unsupported page size 0 MB
 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028
 kernel: #PF: supervisor read access in kernel mode
 kernel: #PF: error_code(0x0000) - not-present page
 kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0
 kernel: Oops: 0000 [#1] PREEMPT SMP PTI
 kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f
 kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017
 kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0
 kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 &lt;8b&gt; 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28
 kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246
 kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004
 kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000
 kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004
 kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000
 kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400
 kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die_body+0x1a/0x60
 kernel:  ? page_fault_oops+0x16f/0x4a0
 kernel:  ? search_bpf_extables+0x65/0x70
 kernel:  ? fixup_exception+0x22/0x310
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0
 kernel:  ? hugetlbfs_fill_super+0x28/0x1a0
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  vfs_get_super+0x40/0xa0
 kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10
 kernel:  vfs_get_tree+0x25/0xd0
 kernel:  vfs_cmd_create+0x64/0xe0
 kernel:  __x64_sys_fsconfig+0x395/0x410
 kernel:  do_syscall_64+0x80/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76
 kernel: RIP: 0033:0x7ffbc0cb87c9
 kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48
 kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af
 kernel: RAX: fffffffffff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26689</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: prevent use-after-free in encode_cap_msg()

In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was
caught by KASAN at this line - 'ceph_buffer_get(arg-&gt;xattr_buf);'. This
implies before the refcount could be increment here, it was freed.

In same file, in "handle_cap_grant()" refcount is decremented by this
line - 'ceph_buffer_put(ci-&gt;i_xattrs.blob);'. It appears that a race
occurred and resource was freed by the latter line before the former
line could increment it.

encode_cap_msg() is called by __send_cap() and __send_cap() is called by
ceph_check_caps() after calling __prep_cap(). __prep_cap() is where
arg-&gt;xattr_buf is assigned to ci-&gt;i_xattrs.blob. This is the spot where
the refcount must be increased to prevent "use after free" error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Fix regression in writes when non-standard maximum write size negotiated

The conversion to netfs in the 6.3 kernel caused a regression when
maximum write size is set by the server to an unexpected value which is
not a multiple of 4096 (similarly if the user overrides the maximum
write size by setting mount parm "wsize", but sets it to a value that
is not a multiple of 4096).  When negotiated write size is not a
multiple of 4096 the netfs code can skip the end of the final
page when doing large sequential writes, causing data corruption.

This section of code is being rewritten/removed due to a large
netfs change, but until that point (ie for the 6.3 kernel until now)
we can not support non-standard maximum write sizes.

Add a warning if a user specifies a wsize on mount that is not
a multiple of 4096 (and round down), also add a change where we
round down the maximum write size if the server negotiates a value
that is not a multiple of 4096 (we also have to check to make sure that
we do not round it down to zero).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222464">SUSE bug 1222464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked

The SEV platform device can be shutdown with a null psp_master,
e.g., using DEBUG_TEST_DRIVER_REMOVE.  Found using KASAN:

[  137.148210] ccp 0000:23:00.1: enabling device (0000 -&gt; 0002)
[  137.162647] ccp 0000:23:00.1: no command queues available
[  137.170598] ccp 0000:23:00.1: sev enabled
[  137.174645] ccp 0000:23:00.1: psp enabled
[  137.178890] general protection fault, probably for non-canonical address 0xdffffc000000001e: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN NOPTI
[  137.182693] KASAN: null-ptr-deref in range [0x00000000000000f0-0x00000000000000f7]
[  137.182693] CPU: 93 PID: 1 Comm: swapper/0 Not tainted 6.8.0-rc1+ #311
[  137.182693] RIP: 0010:__sev_platform_shutdown_locked+0x51/0x180
[  137.182693] Code: 08 80 3c 08 00 0f 85 0e 01 00 00 48 8b 1d 67 b6 01 08 48 b8 00 00 00 00 00 fc ff df 48 8d bb f0 00 00 00 48 89 f9 48 c1 e9 03 &lt;80&gt; 3c 01 00 0f 85 fe 00 00 00 48 8b 9b f0 00 00 00 48 85 db 74 2c
[  137.182693] RSP: 0018:ffffc900000cf9b0 EFLAGS: 00010216
[  137.182693] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 000000000000001e
[  137.182693] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 00000000000000f0
[  137.182693] RBP: ffffc900000cf9c8 R08: 0000000000000000 R09: fffffbfff58f5a66
[  137.182693] R10: ffffc900000cf9c8 R11: ffffffffac7ad32f R12: ffff8881e5052c28
[  137.182693] R13: ffff8881e5052c28 R14: ffff8881758e43e8 R15: ffffffffac64abf8
[  137.182693] FS:  0000000000000000(0000) GS:ffff889de7000000(0000) knlGS:0000000000000000
[  137.182693] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  137.182693] CR2: 0000000000000000 CR3: 0000001cf7c7e000 CR4: 0000000000350ef0
[  137.182693] Call Trace:
[  137.182693]  &lt;TASK&gt;
[  137.182693]  ? show_regs+0x6c/0x80
[  137.182693]  ? __die_body+0x24/0x70
[  137.182693]  ? die_addr+0x4b/0x80
[  137.182693]  ? exc_general_protection+0x126/0x230
[  137.182693]  ? asm_exc_general_protection+0x2b/0x30
[  137.182693]  ? __sev_platform_shutdown_locked+0x51/0x180
[  137.182693]  sev_firmware_shutdown.isra.0+0x1e/0x80
[  137.182693]  sev_dev_destroy+0x49/0x100
[  137.182693]  psp_dev_destroy+0x47/0xb0
[  137.182693]  sp_destroy+0xbb/0x240
[  137.182693]  sp_pci_remove+0x45/0x60
[  137.182693]  pci_device_remove+0xaa/0x1d0
[  137.182693]  device_remove+0xc7/0x170
[  137.182693]  really_probe+0x374/0xbe0
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  __driver_probe_device+0x199/0x460
[  137.182693]  driver_probe_device+0x4e/0xd0
[  137.182693]  __driver_attach+0x191/0x3d0
[  137.182693]  ? __pfx___driver_attach+0x10/0x10
[  137.182693]  bus_for_each_dev+0x100/0x190
[  137.182693]  ? __pfx_bus_for_each_dev+0x10/0x10
[  137.182693]  ? __kasan_check_read+0x15/0x20
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  ? _raw_spin_unlock+0x27/0x50
[  137.182693]  driver_attach+0x41/0x60
[  137.182693]  bus_add_driver+0x2a8/0x580
[  137.182693]  driver_register+0x141/0x480
[  137.182693]  __pci_register_driver+0x1d6/0x2a0
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  ? esrt_sysfs_init+0x1cd/0x5d0
[  137.182693]  ? __pfx_sp_mod_init+0x10/0x10
[  137.182693]  sp_pci_init+0x22/0x30
[  137.182693]  sp_mod_init+0x14/0x30
[  137.182693]  ? __pfx_sp_mod_init+0x10/0x10
[  137.182693]  do_one_initcall+0xd1/0x470
[  137.182693]  ? __pfx_do_one_initcall+0x10/0x10
[  137.182693]  ? parameq+0x80/0xf0
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  ? __kmalloc+0x3b0/0x4e0
[  137.182693]  ? kernel_init_freeable+0x92d/0x1050
[  137.182693]  ? kasan_populate_vmalloc_pte+0x171/0x190
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  kernel_init_freeable+0xa64/0x1050
[  137.182693]  ? __pfx_kernel_init+0x10/0x10
[  137.182693]  kernel_init+0x24/0x160
[  137.182693]  ? __switch_to_asm+0x3e/0x70
[  137.182693]  ret_from_fork+0x40/0x80
[  137.182693]  ? __pfx_kernel_init+0x1
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222373">SUSE bug 1222373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26696</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()

Syzbot reported a hang issue in migrate_pages_batch() called by mbind()
and nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.

While migrate_pages_batch() locks a folio and waits for the writeback to
complete, the log writer thread that should bring the writeback to
completion picks up the folio being written back in
nilfs_lookup_dirty_data_buffers() that it calls for subsequent log
creation and was trying to lock the folio.  Thus causing a deadlock.

In the first place, it is unexpected that folios/pages in the middle of
writeback will be updated and become dirty.  Nilfs2 adds a checksum to
verify the validity of the log being written and uses it for recovery at
mount, so data changes during writeback are suppressed.  Since this is
broken, an unclean shutdown could potentially cause recovery to fail.

Investigation revealed that the root cause is that the wait for writeback
completion in nilfs_page_mkwrite() is conditional, and if the backing
device does not require stable writes, data may be modified without
waiting.

Fix these issues by making nilfs_page_mkwrite() wait for writeback to
finish regardless of the stable write requirement of the backing device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222549">SUSE bug 1222549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26697</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix data corruption in dsync block recovery for small block sizes

The helper function nilfs_recovery_copy_block() of
nilfs_recovery_dsync_blocks(), which recovers data from logs created by
data sync writes during a mount after an unclean shutdown, incorrectly
calculates the on-page offset when copying repair data to the file's page
cache.  In environments where the block size is smaller than the page
size, this flaw can cause data corruption and leak uninitialized memory
bytes during the recovery process.

Fix these issues by correcting this byte offset calculation on the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222550">SUSE bug 1222550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove

In commit ac5047671758 ("hv_netvsc: Disable NAPI before closing the
VMBus channel"), napi_disable was getting called for all channels,
including all subchannels without confirming if they are enabled or not.

This caused hv_netvsc getting hung at napi_disable, when netvsc_probe()
has finished running but nvdev-&gt;subchan_work has not started yet.
netvsc_subchan_work() -&gt; rndis_set_subchannel() has not created the
sub-channels and because of that netvsc_sc_open() is not running.
netvsc_remove() calls cancel_work_sync(&amp;nvdev-&gt;subchan_work), for which
netvsc_subchan_work did not run.

netif_napi_add() sets the bit NAPI_STATE_SCHED because it ensures NAPI
cannot be scheduled. Then netvsc_sc_open() -&gt; napi_enable will clear the
NAPIF_STATE_SCHED bit, so it can be scheduled. napi_disable() does the
opposite.

Now during netvsc_device_remove(), when napi_disable is called for those
subchannels, napi_disable gets stuck on infinite msleep.

This fix addresses this problem by ensuring that napi_disable() is not
getting called for non-enabled NAPI struct.
But netif_napi_del() is still necessary for these non-enabled NAPI struct
for cleanup purpose.

Call trace:
[  654.559417] task:modprobe        state:D stack:    0 pid: 2321 ppid:  1091 flags:0x00004002
[  654.568030] Call Trace:
[  654.571221]  &lt;TASK&gt;
[  654.573790]  __schedule+0x2d6/0x960
[  654.577733]  schedule+0x69/0xf0
[  654.581214]  schedule_timeout+0x87/0x140
[  654.585463]  ? __bpf_trace_tick_stop+0x20/0x20
[  654.590291]  msleep+0x2d/0x40
[  654.593625]  napi_disable+0x2b/0x80
[  654.597437]  netvsc_device_remove+0x8a/0x1f0 [hv_netvsc]
[  654.603935]  rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc]
[  654.611101]  ? do_wait_intr+0xb0/0xb0
[  654.615753]  netvsc_remove+0x7c/0x120 [hv_netvsc]
[  654.621675]  vmbus_remove+0x27/0x40 [hv_vmbus]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222374">SUSE bug 1222374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26700</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix MST Null Ptr for RV

The change try to fix below error specific to RV platform:

BUG: kernel NULL pointer dereference, address: 0000000000000008
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2
Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022
RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0
Call Trace:
 &lt;TASK&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x171/0x4e0
 ? plist_add+0xbe/0x100
 ? exc_page_fault+0x7c/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
 ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
 compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 drm_atomic_check_only+0x5c5/0xa40
 drm_mode_atomic_ioctl+0x76e/0xbc0
 ? _copy_to_user+0x25/0x30
 ? drm_ioctl+0x296/0x4b0
 ? __pfx_drm_mode_atomic_ioctl+0x10/0x10
 drm_ioctl_kernel+0xcd/0x170
 drm_ioctl+0x26d/0x4b0
 ? __pfx_drm_mode_atomic_ioctl+0x10/0x10
 amdgpu_drm_ioctl+0x4e/0x90 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 __x64_sys_ioctl+0x94/0xd0
 do_syscall_64+0x60/0x90
 ? do_syscall_64+0x6c/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f4dad17f76f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c&gt;
RSP: 002b:00007ffd9ae859f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000055e255a55900 RCX: 00007f4dad17f76f
RDX: 00007ffd9ae85a90 RSI: 00000000c03864bc RDI: 000000000000000b
RBP: 00007ffd9ae85a90 R08: 0000000000000003 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c03864bc
R13: 000000000000000b R14: 000055e255a7fc60 R15: 000055e255a01eb0
 &lt;/TASK&gt;
Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device ccm cmac algif_hash algif_skcipher af_alg joydev mousedev bnep &gt;
 typec libphy k10temp ipmi_msghandler roles i2c_scmi acpi_cpufreq mac_hid nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_mas&gt;
CR2: 0000000000000008
---[ end trace 0000000000000000 ]---
RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222870">SUSE bug 1222870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26702</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC

Recently, we encounter kernel crash in function rm3100_common_probe
caused by out of bound access of array rm3100_samp_rates (because of
underlying hardware failures). Add boundary check to prevent out of
bound access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222424">SUSE bug 1222424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26704</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double-free of blocks due to wrong extents moved_len

In ext4_move_extents(), moved_len is only updated when all moves are
successfully executed, and only discards orig_inode and donor_inode
preallocations when moved_len is not zero. When the loop fails to exit
after successfully moving some extents, moved_len is not updated and
remains at 0, so it does not discard the preallocations.

If the moved extents overlap with the preallocated extents, the
overlapped extents are freed twice in ext4_mb_release_inode_pa() and
ext4_process_freed_data() (as described in commit 94d7c16cbbbd ("ext4:
Fix double-free of blocks with EXT4_IOC_MOVE_EXT")), and bb_free is
incremented twice. Hence when trim is executed, a zero-division bug is
triggered in mb_update_avg_fragment_size() because bb_free is not zero
and bb_fragments is zero.

Therefore, update move_len after each extent move to avoid the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26715</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend

In current scenario if Plug-out and Plug-In performed continuously
there could be a chance while checking for dwc-&gt;gadget_driver in
dwc3_gadget_suspend, a NULL pointer dereference may occur.

Call Stack:

	CPU1:                           CPU2:
	gadget_unbind_driver            dwc3_suspend_common
	dwc3_gadget_stop                dwc3_gadget_suspend
                                        dwc3_disconnect_gadget

CPU1 basically clears the variable and CPU2 checks the variable.
Consider CPU1 is running and right before gadget_driver is cleared
and in parallel CPU2 executes dwc3_gadget_suspend where it finds
dwc-&gt;gadget_driver which is not NULL and resumes execution and then
CPU1 completes execution. CPU2 executes dwc3_disconnect_gadget where
it checks dwc-&gt;gadget_driver is already NULL because of which the
NULL pointer deference occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222561">SUSE bug 1222561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26717</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26717" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid-of: fix NULL-deref on failed power up

A while back the I2C HID implementation was split in an ACPI and OF
part, but the new OF driver never initialises the client pointer which
is dereferenced on power-up failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222360">SUSE bug 1222360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858622" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858623" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26718</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-crypt, dm-verity: disable tasklets

Tasklets have an inherent problem with memory corruption. The function
tasklet_action_common calls tasklet_trylock, then it calls the tasklet
callback and then it calls tasklet_unlock. If the tasklet callback frees
the structure that contains the tasklet or if it calls some code that may
free it, tasklet_unlock will write into free memory.

The commits 8e14f610159d and d9a02e016aaf try to fix it for dm-crypt, but
it is not a sufficient fix and the data corruption can still happen [1].
There is no fix for dm-verity and dm-verity will write into free memory
with every tasklet-processed bio.

There will be atomic workqueues implemented in the kernel 6.9 [2]. They
will have better interface and they will not suffer from the memory
corruption problem.

But we need something that stops the memory corruption now and that can be
backported to the stable kernels. So, I'm proposing this commit that
disables tasklets in both dm-crypt and dm-verity. This commit doesn't
remove the tasklet support, because the tasklet code will be reused when
atomic workqueues will be implemented.

[1] https://lore.kernel.org/all/d390d7ee-f142-44d3-822a-87949e14608b@suse.de/T/
[2] https://lore.kernel.org/lkml/20240130091300.2968534-1-tj@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222416">SUSE bug 1222416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26720</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26722</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()

There is a path in rt5645_jack_detect_work(), where rt5645-&gt;jd_mutex
is left locked forever. That may lead to deadlock
when rt5645_jack_detect_work() is called for the second time.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222520">SUSE bug 1222520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not ASSERT() if the newly created subvolume already got read

[BUG]
There is a syzbot crash, triggered by the ASSERT() during subvolume
creation:

 assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319
 ------------[ cut here ]------------
 kernel BUG at fs/btrfs/disk-io.c:1319!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60
  &lt;TASK&gt;
  btrfs_get_new_fs_root+0xd3/0xf0
  create_subvol+0xd02/0x1650
  btrfs_mksubvol+0xe95/0x12b0
  __btrfs_ioctl_snap_create+0x2f9/0x4f0
  btrfs_ioctl_snap_create+0x16b/0x200
  btrfs_ioctl+0x35f0/0x5cf0
  __x64_sys_ioctl+0x19d/0x210
  do_syscall_64+0x3f/0xe0
  entry_SYSCALL_64_after_hwframe+0x63/0x6b
 ---[ end trace 0000000000000000 ]---

[CAUSE]
During create_subvol(), after inserting root item for the newly created
subvolume, we would trigger btrfs_get_new_fs_root() to get the
btrfs_root of that subvolume.

The idea here is, we have preallocated an anonymous device number for
the subvolume, thus we can assign it to the new subvolume.

But there is really nothing preventing things like backref walk to read
the new subvolume.
If that happens before we call btrfs_get_new_fs_root(), the subvolume
would be read out, with a new anonymous device number assigned already.

In that case, we would trigger ASSERT(), as we really expect no one to
read out that subvolume (which is not yet accessible from the fs).
But things like backref walk is still possible to trigger the read on
the subvolume.

Thus our assumption on the ASSERT() is not correct in the first place.

[FIX]
Fix it by removing the ASSERT(), and just free the @anon_dev, reset it
to 0, and continue.

If the subvolume tree is read out by something else, it should have
already get a new anon_dev assigned thus we only need to free the
preallocated one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26733</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arp: Prevent overflow in arp_req_get().

syzkaller reported an overflown write in arp_req_get(). [0]

When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour
entry and copies neigh-&gt;ha to struct arpreq.arp_ha.sa_data.

The arp_ha here is struct sockaddr, not struct sockaddr_storage, so
the sa_data buffer is just 14 bytes.

In the splat below, 2 bytes are overflown to the next int field,
arp_flags.  We initialise the field just after the memcpy(), so it's
not a problem.

However, when dev-&gt;addr_len is greater than 22 (e.g. MAX_ADDR_LEN),
arp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)
in arp_ioctl() before calling arp_req_get().

To avoid the overflow, let's limit the max length of memcpy().

Note that commit b5f0de6df6dc ("net: dev: Convert sa_data to flexible
array in struct sockaddr") just silenced syzkaller.

[0]:
memcpy: detected field-spanning write (size 16) of single field "r-&gt;arp_ha.sa_data" at net/ipv4/arp.c:1128 (size 14)
WARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Modules linked in:
CPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014
RIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Code: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb &lt;0f&gt; 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6
RSP: 0018:ffffc900050b7998 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001
RBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000
R13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010
FS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261
 inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981
 sock_do_ioctl+0xdf/0x260 net/socket.c:1204
 sock_ioctl+0x3ef/0x650 net/socket.c:1321
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x64/0xce
RIP: 0033:0x7f172b262b8d
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d
RDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003
RBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix possible use-after-free and null-ptr-deref

The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222372">SUSE bug 1222372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26736</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Increase buffer size in afs_update_volume_status()

The max length of volume-&gt;vid value is 20 characters.
So increase idbuf[] size up to 24 to avoid overflow.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[DH: Actually, it's 20 + NUL, so increase it to 24 and use snprintf()]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222586">SUSE bug 1222586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel

The following race is possible between bpf_timer_cancel_and_free
and bpf_timer_cancel. It will lead a UAF on the timer-&gt;timer.

bpf_timer_cancel();
	spin_lock();
	t = timer-&gt;time;
	spin_unlock();

					bpf_timer_cancel_and_free();
						spin_lock();
						t = timer-&gt;timer;
						timer-&gt;timer = NULL;
						spin_unlock();
						hrtimer_cancel(&amp;t-&gt;timer);
						kfree(t);

	/* UAF on t */
	hrtimer_cancel(&amp;t-&gt;timer);

In bpf_timer_cancel_and_free, this patch frees the timer-&gt;timer
after a rcu grace period. This requires a rcu_head addition
to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init,
this does not need a kfree_rcu because it is still under the
spin_lock and timer-&gt;timer has not been visible by others yet.

In bpf_timer_cancel, rcu_read_lock() is added because this helper
can be used in a non rcu critical section context (e.g. from
a sleepable bpf prog). Other timer-&gt;timer usages in helpers.c
have been audited, bpf_timer_cancel() is the only place where
timer-&gt;timer is used outside of the spin_lock.

Another solution considered is to mark a t-&gt;flag in bpf_timer_cancel
and clear it after hrtimer_cancel() is done.  In bpf_timer_cancel_and_free,
it busy waits for the flag to be cleared before kfree(t). This patch
goes with a straight forward solution and frees timer-&gt;timer after
a rcu grace period.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222557">SUSE bug 1222557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: don't override retval if we already lost the skb

If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.

Move the retval override to the error path which actually need it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix disable_managed_interrupts

Correct blk-mq registration issue with module parameter
disable_managed_interrupts enabled.

When we turn off the default PCI_IRQ_AFFINITY flag, the driver needs to
register with blk-mq using blk_mq_map_queues(). The driver is currently
calling blk_mq_pci_map_queues() which results in a stack trace and possibly
undefined behavior.

Stack Trace:
[    7.860089] scsi host2: smartpqi
[    7.871934] WARNING: CPU: 0 PID: 238 at block/blk-mq-pci.c:52 blk_mq_pci_map_queues+0xca/0xd0
[    7.889231] Modules linked in: sd_mod t10_pi sg uas smartpqi(+) crc32c_intel scsi_transport_sas usb_storage dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
[    7.924755] CPU: 0 PID: 238 Comm: kworker/0:3 Not tainted 4.18.0-372.88.1.el8_6_smartpqi_test.x86_64 #1
[    7.944336] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 03/08/2022
[    7.963026] Workqueue: events work_for_cpu_fn
[    7.978275] RIP: 0010:blk_mq_pci_map_queues+0xca/0xd0
[    7.978278] Code: 48 89 de 89 c7 e8 f6 0f 4f 00 3b 05 c4 b7 8e 01 72 e1 5b 31 c0 5d 41 5c 41 5d 41 5e 41 5f e9 7d df 73 00 31 c0 e9 76 df 73 00 &lt;0f&gt; 0b eb bc 90 90 0f 1f 44 00 00 41 57 49 89 ff 41 56 41 55 41 54
[    7.978280] RSP: 0018:ffffa95fc3707d50 EFLAGS: 00010216
[    7.978283] RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000010
[    7.978284] RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffff9190c32d4310
[    7.978286] RBP: 0000000000000000 R08: ffffa95fc3707d38 R09: ffff91929b81ac00
[    7.978287] R10: 0000000000000001 R11: ffffa95fc3707ac0 R12: 0000000000000000
[    7.978288] R13: ffff9190c32d4000 R14: 00000000ffffffff R15: ffff9190c4c950a8
[    7.978290] FS:  0000000000000000(0000) GS:ffff9193efc00000(0000) knlGS:0000000000000000
[    7.978292] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.172814] CR2: 000055d11166c000 CR3: 00000002dae10002 CR4: 00000000007706f0
[    8.172816] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    8.172817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    8.172818] PKRU: 55555554
[    8.172819] Call Trace:
[    8.172823]  blk_mq_alloc_tag_set+0x12e/0x310
[    8.264339]  scsi_add_host_with_dma.cold.9+0x30/0x245
[    8.279302]  pqi_ctrl_init+0xacf/0xc8e [smartpqi]
[    8.294085]  ? pqi_pci_probe+0x480/0x4c8 [smartpqi]
[    8.309015]  pqi_pci_probe+0x480/0x4c8 [smartpqi]
[    8.323286]  local_pci_probe+0x42/0x80
[    8.337855]  work_for_cpu_fn+0x16/0x20
[    8.351193]  process_one_work+0x1a7/0x360
[    8.364462]  ? create_worker+0x1a0/0x1a0
[    8.379252]  worker_thread+0x1ce/0x390
[    8.392623]  ? create_worker+0x1a0/0x1a0
[    8.406295]  kthread+0x10a/0x120
[    8.418428]  ? set_kthread_struct+0x50/0x50
[    8.431532]  ret_from_fork+0x1f/0x40
[    8.444137] ---[ end trace 1bf0173d39354506 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222608">SUSE bug 1222608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/qedr: Fix qedr_create_user_qp error flow

Avoid the following warning by making sure to free the allocated
resources in case that qedr_init_user_queue() fail.

-----------[ cut here ]-----------
WARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Modules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3
ghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]
CPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1
Hardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022
RIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Code: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 &lt;0f&gt; 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff
RSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286
RAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016
RDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
R10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80
R13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0
Call Trace:
&lt;TASK&gt;
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
? __warn+0x81/0x110
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
? report_bug+0x10a/0x140
? handle_bug+0x3c/0x70
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
ib_uverbs_close+0x1f/0xb0 [ib_uverbs]
__fput+0x94/0x250
task_work_run+0x5c/0x90
do_exit+0x270/0x4a0
do_group_exit+0x2d/0x90
get_signal+0x87c/0x8c0
arch_do_signal_or_restart+0x25/0x100
? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]
exit_to_user_mode_loop+0x9c/0x130
exit_to_user_mode_prepare+0xb6/0x100
syscall_exit_to_user_mode+0x12/0x40
do_syscall_64+0x69/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x22/0x40
? do_syscall_64+0x69/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x22/0x40
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
? common_interrupt+0x43/0xa0
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x1470abe3ec6b
Code: Unable to access opcode bytes at RIP 0x1470abe3ec41.
RSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b
RDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004
RBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00
R10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358
R13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470
&lt;/TASK&gt;
--[ end trace 888a9b92e04c5c97 ]--
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222677">SUSE bug 1222677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Support specifying the srpt_service_guid parameter

Make loading ib_srpt with this parameter set work. The current behavior is
that setting that parameter while loading the ib_srpt kernel module
triggers the following kernel crash:

BUG: kernel NULL pointer dereference, address: 0000000000000000
Call Trace:
 &lt;TASK&gt;
 parse_one+0x18c/0x1d0
 parse_args+0xe1/0x230
 load_module+0x8de/0xa60
 init_module_from_file+0x8b/0xd0
 idempotent_init_module+0x181/0x240
 __x64_sys_finit_module+0x5a/0xb0
 do_syscall_64+0x5f/0xe0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222449">SUSE bug 1222449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV

When kdump kernel tries to copy dump data over SR-IOV, LPAR panics due
to NULL pointer exception:

  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)
  BUG: Kernel NULL pointer dereference on read at 0x00000000
  Faulting instruction address: 0xc000000020847ad4
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop
  CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries
  NIP:  c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c
  REGS: c000000029162ca0 TRAP: 0300   Not tainted  (6.4.0-Test102+)
  MSR:  800000000280b033 &lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE&gt;  CR: 48288244  XER: 00000008
  CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1
  ...
  NIP _find_next_zero_bit+0x24/0x110
  LR  bitmap_find_next_zero_area_off+0x5c/0xe0
  Call Trace:
    dev_printk_emit+0x38/0x48 (unreliable)
    iommu_area_alloc+0xc4/0x180
    iommu_range_alloc+0x1e8/0x580
    iommu_alloc+0x60/0x130
    iommu_alloc_coherent+0x158/0x2b0
    dma_iommu_alloc_coherent+0x3c/0x50
    dma_alloc_attrs+0x170/0x1f0
    mlx5_cmd_init+0xc0/0x760 [mlx5_core]
    mlx5_function_setup+0xf0/0x510 [mlx5_core]
    mlx5_init_one+0x84/0x210 [mlx5_core]
    probe_one+0x118/0x2c0 [mlx5_core]
    local_pci_probe+0x68/0x110
    pci_call_probe+0x68/0x200
    pci_device_probe+0xbc/0x1a0
    really_probe+0x104/0x540
    __driver_probe_device+0xb4/0x230
    driver_probe_device+0x54/0x130
    __driver_attach+0x158/0x2b0
    bus_for_each_dev+0xa8/0x130
    driver_attach+0x34/0x50
    bus_add_driver+0x16c/0x300
    driver_register+0xa4/0x1b0
    __pci_register_driver+0x68/0x80
    mlx5_init+0xb8/0x100 [mlx5_core]
    do_one_initcall+0x60/0x300
    do_init_module+0x7c/0x2b0

At the time of LPAR dump, before kexec hands over control to kdump
kernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.
For the SR-IOV case, default DMA window "ibm,dma-window" is removed from
the FDT and DDW added, for the device.

Now, kexec hands over control to the kdump kernel.

When the kdump kernel initializes, PCI busses are scanned and IOMMU
group/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV
case, there is no "ibm,dma-window". The original commit: b1fc44eaa9ba,
fixes the path where memory is pre-mapped (direct mapped) to the DDW.
When TCEs are direct mapped, there is no need to initialize IOMMU
tables.

iommu_table_setparms_lpar() only considers "ibm,dma-window" property
when initiallizing IOMMU table. In the scenario where TCEs are
dynamically allocated for SR-IOV, newly created IOMMU table is not
initialized. Later, when the device driver tries to enter TCEs for the
SR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().

The fix is to initialize the IOMMU table with DDW property stored in the
FDT. There are 2 points to remember:

	1. For the dedicated adapter, kdump kernel would encounter both
	   default and DDW in FDT. In this case, DDW property is used to
	   initialize the IOMMU table.

	2. A DDW could be direct or dynamic mapped. kdump kernel would
	   initialize IOMMU table and mark the existing DDW as
	   "dynamic". This works fine since, at the time of table
	   initialization, iommu_table_clear() makes some space in the
	   DDW, for some predefined number of TCEs which are needed for
	   kdump to succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: roles: fix NULL pointer issue when put module's reference

In current design, usb role class driver will get usb_role_switch parent's
module reference after the user get usb_role_switch device and put the
reference after the user put the usb_role_switch device. However, the
parent device of usb_role_switch may be removed before the user put the
usb_role_switch. If so, then, NULL pointer issue will be met when the user
put the parent module's reference.

This will save the module pointer in structure of usb_role_switch. Then,
we don't need to find module by iterating long relations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222609">SUSE bug 1222609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26748</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: fix memory double free when handle zero packet

829  if (request-&gt;complete) {
830          spin_unlock(&amp;priv_dev-&gt;lock);
831          usb_gadget_giveback_request(&amp;priv_ep-&gt;endpoint,
832                                    request);
833          spin_lock(&amp;priv_dev-&gt;lock);
834  }
835
836  if (request-&gt;buf == priv_dev-&gt;zlp_buf)
837      cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, request);

Driver append an additional zero packet request when queue a packet, which
length mod max packet size is 0. When transfer complete, run to line 831,
usb_gadget_giveback_request() will free this requestion. 836 condition is
true, so cdns3_gadget_ep_free_request() free this request again.

Log:

[ 1920.140696][  T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]
[ 1920.140696][  T150]
[ 1920.151837][  T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):
[ 1920.159082][  T150]  cdns3_gadget_giveback+0x134/0x2c0 [cdns3]
[ 1920.164988][  T150]  cdns3_transfer_completed+0x438/0x5f8 [cdns3]

Add check at line 829, skip call usb_gadget_giveback_request() if it is
additional zero length packet request. Needn't call
usb_gadget_giveback_request() because it is allocated in this driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222513">SUSE bug 1222513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26749</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()

  ...
  cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, &amp;priv_req-&gt;request);
  list_del_init(&amp;priv_req-&gt;list);
  ...

'priv_req' actually free at cdns3_gadget_ep_free_request(). But
list_del_init() use priv_req-&gt;list after it.

[ 1542.642868][  T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4
[ 1542.642868][  T534]
[ 1542.653162][  T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):
[ 1542.660311][  T534]  __list_del_entry_valid+0x10/0xd4
[ 1542.665375][  T534]  cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]
[ 1542.671571][  T534]  usb_ep_disable+0x44/0xe4
[ 1542.675948][  T534]  ffs_func_eps_disable+0x64/0xc8
[ 1542.680839][  T534]  ffs_func_set_alt+0x74/0x368
[ 1542.685478][  T534]  ffs_func_disable+0x18/0x28

Move list_del_init() before cdns3_gadget_ep_free_request() to resolve this
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222680">SUSE bug 1222680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26751</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: ep93xx: Add terminator to gpiod_lookup_table

Without the terminator, if a con_id is passed to gpio_find() that
does not exist in the lookup table the function will not stop looping
correctly, and eventually cause an oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222724">SUSE bug 1222724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()

The gtp_net_ops pernet operations structure for the subsystem must be
registered before registering the generic netlink family.

Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:

general protection fault, probably for non-canonical address
0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
RIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]
Code: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86
      df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt;
      3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74
RSP: 0018:ffff888014107220 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000
FS:  00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x90/0xa0
 ? die_addr+0x50/0xd0
 ? exc_general_protection+0x148/0x220
 ? asm_exc_general_protection+0x22/0x30
 ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]
 ? __alloc_skb+0x1dd/0x350
 ? __pfx___alloc_skb+0x10/0x10
 genl_dumpit+0x11d/0x230
 netlink_dump+0x5b9/0xce0
 ? lockdep_hardirqs_on_prepare+0x253/0x430
 ? __pfx_netlink_dump+0x10/0x10
 ? kasan_save_track+0x10/0x40
 ? __kasan_kmalloc+0x9b/0xa0
 ? genl_start+0x675/0x970
 __netlink_dump_start+0x6fc/0x9f0
 genl_family_rcv_msg_dumpit+0x1bb/0x2d0
 ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10
 ? genl_op_from_small+0x2a/0x440
 ? cap_capable+0x1d0/0x240
 ? __pfx_genl_start+0x10/0x10
 ? __pfx_genl_dumpit+0x10/0x10
 ? __pfx_genl_done+0x10/0x10
 ? security_capable+0x9d/0xe0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222632">SUSE bug 1222632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26758</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26758" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26758" ref_url="https://www.suse.com/security/cve/CVE-2024-26758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: Don't ignore suspended array in md_check_recovery()

mddev_suspend() never stop sync_thread, hence it doesn't make sense to
ignore suspended array in md_check_recovery(), which might cause
sync_thread can't be unregistered.

After commit f52f5c71f3d4 ("md: fix stopping sync thread"), following
hang can be triggered by test shell/integrity-caching.sh:

1) suspend the array:
raid_postsuspend
 mddev_suspend

2) stop the array:
raid_dtr
 md_stop
  __md_stop_writes
   stop_sync_thread
    set_bit(MD_RECOVERY_INTR, &amp;mddev-&gt;recovery);
    md_wakeup_thread_directly(mddev-&gt;sync_thread);
    wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery))

3) sync thread done:
md_do_sync
 set_bit(MD_RECOVERY_DONE, &amp;mddev-&gt;recovery);
 md_wakeup_thread(mddev-&gt;thread);

4) daemon thread can't unregister sync thread:
md_check_recovery
 if (mddev-&gt;suspended)
   return; -&gt; return directly
 md_read_sync_thread
 clear_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery);
 -&gt; MD_RECOVERY_RUNNING can't be cleared, hence step 2 hang;

This problem is not just related to dm-raid, fix it by ignoring
suspended array in md_check_recovery(). And follow up patches will
improve dm-raid better to frozen sync thread during suspend.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26758/">CVE-2024-26758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26758">CVE-2024-26758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230341">SUSE bug 1230341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26759</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26759" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/swap: fix race when skipping swapcache

When skipping swapcache for SWP_SYNCHRONOUS_IO, if two or more threads
swapin the same entry at the same time, they get different pages (A, B). 
Before one thread (T0) finishes the swapin and installs page (A) to the
PTE, another thread (T1) could finish swapin of page (B), swap_free the
entry, then swap out the possibly modified page reusing the same entry. 
It breaks the pte_same check in (T0) because PTE value is unchanged,
causing ABA problem.  Thread (T0) will install a stalled page (A) into the
PTE and cause data corruption.

One possible callstack is like this:

CPU0                                 CPU1
----                                 ----
do_swap_page()                       do_swap_page() with same entry
&lt;direct swapin path&gt;                 &lt;direct swapin path&gt;
&lt;alloc page A&gt;                       &lt;alloc page B&gt;
swap_read_folio() &lt;- read to page A  swap_read_folio() &lt;- read to page B
&lt;slow on later locks or interrupt&gt;   &lt;finished swapin first&gt;
...                                  set_pte_at()
                                     swap_free() &lt;- entry is free
                                     &lt;write to page B, now page A stalled&gt;
                                     &lt;swap out page B to same swap entry&gt;
pte_same() &lt;- Check pass, PTE seems
              unchanged, but page A
              is stalled!
swap_free() &lt;- page B content lost!
set_pte_at() &lt;- staled page A installed!

And besides, for ZRAM, swap_free() allows the swap device to discard the
entry content, so even if page (B) is not modified, if swap_read_folio()
on CPU0 happens later than swap_free() on CPU1, it may also cause data
loss.

To fix this, reuse swapcache_prepare which will pin the swap entry using
the cache flag, and allow only one thread to swap it in, also prevent any
parallel code from putting the entry in the cache.  Release the pin after
PT unlocked.

Racers just loop and wait since it's a rare and very short event.  A
schedule_timeout_uninterruptible(1) call is added to avoid repeated page
faults wasting too much CPU, causing livelock or adding too much noise to
perf statistics.  A similar livelock issue was described in commit
029c4628b2eb ("mm: swap: get rid of livelock in swapin readahead")

Reproducer:

This race issue can be triggered easily using a well constructed
reproducer and patched brd (with a delay in read path) [1]:

With latest 6.8 mainline, race caused data loss can be observed easily:
$ gcc -g -lpthread test-thread-swap-race.c &amp;&amp; ./a.out
  Polulating 32MB of memory region...
  Keep swapping out...
  Starting round 0...
  Spawning 65536 workers...
  32746 workers spawned, wait for done...
  Round 0: Error on 0x5aa00, expected 32746, got 32743, 3 data loss!
  Round 0: Error on 0x395200, expected 32746, got 32743, 3 data loss!
  Round 0: Error on 0x3fd000, expected 32746, got 32737, 9 data loss!
  Round 0 Failed, 15 data loss!

This reproducer spawns multiple threads sharing the same memory region
using a small swap device.  Every two threads updates mapped pages one by
one in opposite direction trying to create a race, with one dedicated
thread keep swapping out the data out using madvise.

The reproducer created a reproduce rate of about once every 5 minutes, so
the race should be totally possible in production.

After this patch, I ran the reproducer for over a few hundred rounds and
no data loss observed.

Performance overhead is minimal, microbenchmark swapin 10G from 32G
zram:

Before:     10934698 us
After:      11157121 us
Cached:     13155355 us (Dropping SWP_SYNCHRONOUS_IO flag)

[kasong@tencent.com: v4]
  Link: https://lkml.kernel.org/r/20240219082040.7495-1-ryncsn@gmail.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230340">SUSE bug 1230340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26760</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26760" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26760" ref_url="https://www.suse.com/security/cve/CVE-2024-26760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: pscsi: Fix bio_put() for error case

As of commit 066ff571011d ("block: turn bio_kmalloc into a simple kmalloc
wrapper"), a bio allocated by bio_kmalloc() must be freed by bio_uninit()
and kfree(). That is not done properly for the error case, hitting WARN and
NULL pointer dereference in bio_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26760/">CVE-2024-26760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26760">CVE-2024-26760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222596">SUSE bug 1222596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26763</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-crypt: don't modify the data when using authenticated encryption

It was said that authenticated encryption could produce invalid tag when
the data that is being encrypted is modified [1]. So, fix this problem by
copying the data into the clone bio first and then encrypt them inside the
clone bio.

This may reduce performance, but it is needed to prevent the user from
corrupting the device by writing data with O_DIRECT and modifying them at
the same time.

[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222720">SUSE bug 1222720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26764</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio

If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the
following kernel warning appears:

WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8
Call trace:
 kiocb_set_cancel_fn+0x9c/0xa8
 ffs_epfile_read_iter+0x144/0x1d0
 io_read+0x19c/0x498
 io_issue_sqe+0x118/0x27c
 io_submit_sqes+0x25c/0x5fc
 __arm64_sys_io_uring_enter+0x104/0xab0
 invoke_syscall+0x58/0x11c
 el0_svc_common+0xb4/0xf4
 do_el0_svc+0x2c/0xb0
 el0_svc+0x2c/0xa4
 el0t_64_sync_handler+0x68/0xb4
 el0t_64_sync+0x1a4/0x1a8

Fix this by setting the IOCB_AIO_RW flag for read and write I/O that is
submitted by libaio.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26766</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one error

Unfortunately the commit `fd8958efe877` introduced another error
causing the `descs` array to overflow. This reults in further crashes
easily reproducible by `sendmsg` system call.

[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI
[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]
--
[ 1080.974535] Call Trace:
[ 1080.976990]  &lt;TASK&gt;
[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]
[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]
[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]
[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]
[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210
--
[ 1081.148347]  __sys_sendmsg+0x59/0xa0

crash&gt; ipoib_txreq 0xffff9cfeba229f00
struct ipoib_txreq {
  txreq = {
    list = {
      next = 0xffff9cfeba229f00,
      prev = 0xffff9cfeba229f00
    },
    descp = 0xffff9cfeba229f40,
    coalesce_buf = 0x0,
    wait = 0xffff9cfea4e69a48,
    complete = 0xffffffffc0fe0760 &lt;hfi1_ipoib_sdma_complete&gt;,
    packet_len = 0x46d,
    tlen = 0x0,
    num_desc = 0x0,
    desc_limit = 0x6,
    next_descq_idx = 0x45c,
    coalesce_idx = 0x0,
    flags = 0x0,
    descs = {{
        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)
      }, {
        qw = {  0x3800014231b108, 0x4}
      }, {
        qw = { 0x310000e4ee0fcf0, 0x8}
      }, {
        qw = {  0x3000012e9f8000, 0x8}
      }, {
        qw = {  0x59000dfb9d0000, 0x8}
      }, {
        qw = {  0x78000e02e40000, 0x8}
      }}
  },
  sdma_hdr =  0x400300015528b000,  &lt;&lt;&lt; invalid pointer in the tx request structure
  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)
  complete = 0x0,
  priv = 0x0,
  txq = 0xffff9cfea4e69880,
  skb = 0xffff9d099809f400
}

If an SDMA send consists of exactly 6 descriptors and requires dword
padding (in the 7th descriptor), the sdma_txreq descriptor array is not
properly expanded and the packet will overflow into the container
structure. This results in a panic when the send completion runs. The
exact panic varies depending on what elements of the container structure
get corrupted. The fix is to use the correct expression in
_pad_sdma_tx_descs() to test the need to expand the descriptor array.

With this patch the crashes are no longer reproducible and the machine is
stable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222882">SUSE bug 1222882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26767</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26767" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fixed integer types and null check locations

[why]:
issues fixed:
- comparison with wider integer type in loop condition which can cause
infinite loops
- pointer dereference before null check
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230339">SUSE bug 1230339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26769</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: avoid deadlock on delete association path

When deleting an association the shutdown path is deadlocking because we
try to flush the nvmet_wq nested. Avoid this by deadlock by deferring
the put work into its own work item.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222727">SUSE bug 1222727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26771</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: edma: Add some null pointer checks to the edma_probe

devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222610">SUSE bug 1222610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()

Places the logic for checking if the group's block bitmap is corrupt under
the protection of the group lock to avoid allocating blocks from the group
with a corrupted block bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222613">SUSE bug 1222613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26773</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()

Determine if the group block bitmap is corrupted before using ac_b_ex in
ext4_mb_try_best_found() to avoid allocating blocks from a group with a
corrupted block bitmap in the following concurrency and making the
situation worse.

ext4_mb_regular_allocator
  ext4_lock_group(sb, group)
  ext4_mb_good_group
   // check if the group bbitmap is corrupted
  ext4_mb_complex_scan_group
   // Scan group gets ac_b_ex but doesn't use it
  ext4_unlock_group(sb, group)
                           ext4_mark_group_bitmap_corrupted(group)
                           // The block bitmap was corrupted during
                           // the group unlock gap.
  ext4_mb_try_best_found
    ext4_lock_group(ac-&gt;ac_sb, group)
    ext4_mb_use_best_found
      mb_mark_used
      // Allocating blocks in block bitmap corrupted group
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: avoid potential deadlock at set_capacity

Move set_capacity() outside of the section procected by (&amp;d-&gt;lock).
To avoid possible interrupt unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
[1] lock(&amp;bdev-&gt;bd_size_lock);
                                local_irq_disable();
                            [2] lock(&amp;d-&gt;lock);
                            [3] lock(&amp;bdev-&gt;bd_size_lock);
   &lt;Interrupt&gt;
[4]  lock(&amp;d-&gt;lock);

  *** DEADLOCK ***

Where [1](&amp;bdev-&gt;bd_size_lock) hold by zram_add()-&gt;set_capacity().
[2]lock(&amp;d-&gt;lock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()
is trying to acquire [3](&amp;bdev-&gt;bd_size_lock) at set_capacity() call.
In this situation an attempt to acquire [4]lock(&amp;d-&gt;lock) from
aoecmd_cfg_rsp() will lead to deadlock.

So the simplest solution is breaking lock dependency
[2](&amp;d-&gt;lock) -&gt; [3](&amp;bdev-&gt;bd_size_lock) by moving set_capacity()
outside.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222627">SUSE bug 1222627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26776</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected

Return IRQ_NONE from the interrupt handler when no interrupt was
detected. Because an empty interrupt will cause a null pointer error:

    Unable to handle kernel NULL pointer dereference at virtual
  address 0000000000000008
    Call trace:
        complete+0x54/0x100
        hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]
        __handle_irq_event_percpu+0x64/0x1e0
        handle_irq_event+0x7c/0x1cc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222764">SUSE bug 1222764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26777</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: sis: Error out if pixclock equals zero

The userspace program could pass any values to the driver through
ioctl() interface. If the driver doesn't check the value of pixclock,
it may cause divide-by-zero error.

In sisfb_check_var(), var-&gt;pixclock is used as a divisor to caculate
drate before it is checked against zero. Fix this by checking it
at the beginning.

This is similar to CVE-2022-3061 in i740fb which was fixed by
commit 15cf0b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222765">SUSE bug 1222765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26778</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: savage: Error out if pixclock equals zero

The userspace program could pass any values to the driver through
ioctl() interface. If the driver doesn't check the value of pixclock,
it may cause divide-by-zero error.

Although pixclock is checked in savagefb_decode_var(), but it is not
checked properly in savagefb_probe(). Fix this by checking whether
pixclock is zero in the function savagefb_check_var() before
info-&gt;var.pixclock is used as the divisor.

This is similar to CVE-2022-3061 in i740fb which was fixed by
commit 15cf0b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222770">SUSE bug 1222770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26779</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix race condition on enabling fast-xmit

fast-xmit must only be enabled after the sta has been uploaded to the driver,
otherwise it could end up passing the not-yet-uploaded sta via drv_tx calls
to the driver, leading to potential crashes because of uninitialized drv_priv
data.
Add a missing sta-&gt;uploaded check and re-check fast xmit after inserting a sta.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222772">SUSE bug 1222772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26782</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix double-free on socket dismantle

when MPTCP server accepts an incoming connection, it clones its listener
socket. However, the pointer to 'inet_opt' for the new socket has the same
value as the original one: as a consequence, on program exit it's possible
to observe the following splat:

  BUG: KASAN: double-free in inet_sock_destruct+0x54f/0x8b0
  Free of addr ffff888485950880 by task swapper/25/0

  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Not tainted 6.8.0-rc1+ #609
  Hardware name: Supermicro SYS-6027R-72RF/X9DRH-7TF/7F/iTF/iF, BIOS 3.0  07/26/2013
  Call Trace:
   &lt;IRQ&gt;
   dump_stack_lvl+0x32/0x50
   print_report+0xca/0x620
   kasan_report_invalid_free+0x64/0x90
   __kasan_slab_free+0x1aa/0x1f0
   kfree+0xed/0x2e0
   inet_sock_destruct+0x54f/0x8b0
   __sk_destruct+0x48/0x5b0
   rcu_do_batch+0x34e/0xd90
   rcu_core+0x559/0xac0
   __do_softirq+0x183/0x5a4
   irq_exit_rcu+0x12d/0x170
   sysvec_apic_timer_interrupt+0x6b/0x80
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   asm_sysvec_apic_timer_interrupt+0x16/0x20
  RIP: 0010:cpuidle_enter_state+0x175/0x300
  Code: 30 00 0f 84 1f 01 00 00 83 e8 01 83 f8 ff 75 e5 48 83 c4 18 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc fb 45 85 ed &lt;0f&gt; 89 60 ff ff ff 48 c1 e5 06 48 c7 43 18 00 00 00 00 48 83 44 2b
  RSP: 0018:ffff888481cf7d90 EFLAGS: 00000202
  RAX: 0000000000000000 RBX: ffff88887facddc8 RCX: 0000000000000000
  RDX: 1ffff1110ff588b1 RSI: 0000000000000019 RDI: ffff88887fac4588
  RBP: 0000000000000004 R08: 0000000000000002 R09: 0000000000043080
  R10: 0009b02ea273363f R11: ffff88887fabf42b R12: ffffffff932592e0
  R13: 0000000000000004 R14: 0000000000000000 R15: 00000022c880ec80
   cpuidle_enter+0x4a/0xa0
   do_idle+0x310/0x410
   cpu_startup_entry+0x51/0x60
   start_secondary+0x211/0x270
   secondary_startup_64_no_verify+0x184/0x18b
   &lt;/TASK&gt;

  Allocated by task 6853:
   kasan_save_stack+0x1c/0x40
   kasan_save_track+0x10/0x30
   __kasan_kmalloc+0xa6/0xb0
   __kmalloc+0x1eb/0x450
   cipso_v4_sock_setattr+0x96/0x360
   netlbl_sock_setattr+0x132/0x1f0
   selinux_netlbl_socket_post_create+0x6c/0x110
   selinux_socket_post_create+0x37b/0x7f0
   security_socket_post_create+0x63/0xb0
   __sock_create+0x305/0x450
   __sys_socket_create.part.23+0xbd/0x130
   __sys_socket+0x37/0xb0
   __x64_sys_socket+0x6f/0xb0
   do_syscall_64+0x83/0x160
   entry_SYSCALL_64_after_hwframe+0x6e/0x76

  Freed by task 6858:
   kasan_save_stack+0x1c/0x40
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x3b/0x60
   __kasan_slab_free+0x12c/0x1f0
   kfree+0xed/0x2e0
   inet_sock_destruct+0x54f/0x8b0
   __sk_destruct+0x48/0x5b0
   subflow_ulp_release+0x1f0/0x250
   tcp_cleanup_ulp+0x6e/0x110
   tcp_v4_destroy_sock+0x5a/0x3a0
   inet_csk_destroy_sock+0x135/0x390
   tcp_fin+0x416/0x5c0
   tcp_data_queue+0x1bc8/0x4310
   tcp_rcv_state_process+0x15a3/0x47b0
   tcp_v4_do_rcv+0x2c1/0x990
   tcp_v4_rcv+0x41fb/0x5ed0
   ip_protocol_deliver_rcu+0x6d/0x9f0
   ip_local_deliver_finish+0x278/0x360
   ip_local_deliver+0x182/0x2c0
   ip_rcv+0xb5/0x1c0
   __netif_receive_skb_one_core+0x16e/0x1b0
   process_backlog+0x1e3/0x650
   __napi_poll+0xa6/0x500
   net_rx_action+0x740/0xbb0
   __do_softirq+0x183/0x5a4

  The buggy address belongs to the object at ffff888485950880
   which belongs to the cache kmalloc-64 of size 64
  The buggy address is located 0 bytes inside of
   64-byte region [ffff888485950880, ffff8884859508c0)

  The buggy address belongs to the physical page:
  page:0000000056d1e95e refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888485950700 pfn:0x485950
  flags: 0x57ffffc0000800(slab|node=1|zone=2|lastcpupid=0x1fffff)
  page_type: 0xffffffff()
  raw: 0057ffffc0000800 ffff88810004c640 ffffea00121b8ac0 dead000000000006
  raw: ffff888485950700 0000000000200019 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888485950780: fa fb fb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26783</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index

With numa balancing on, when a numa system is running where a numa node
doesn't have its local memory so it has no managed zones, the following
oops has been observed.  It's because wakeup_kswapd() is called with a
wrong zone index, -1.  Fixed it by checking the index before calling
wakeup_kswapd().

&gt; BUG: unable to handle page fault for address: 00000000000033f3
&gt; #PF: supervisor read access in kernel mode
&gt; #PF: error_code(0x0000) - not-present page
&gt; PGD 0 P4D 0
&gt; Oops: 0000 [#1] PREEMPT SMP NOPTI
&gt; CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255
&gt; Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
&gt;    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
&gt; RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)
&gt; Code: (omitted)
&gt; RSP: 0000:ffffc90004257d58 EFLAGS: 00010286
&gt; RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003
&gt; RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480
&gt; RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff
&gt; R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003
&gt; R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940
&gt; FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000
&gt; CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&gt; CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0
&gt; DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
&gt; DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
&gt; PKRU: 55555554
&gt; Call Trace:
&gt;  &lt;TASK&gt;
&gt; ? __die
&gt; ? page_fault_oops
&gt; ? __pte_offset_map_lock
&gt; ? exc_page_fault
&gt; ? asm_exc_page_fault
&gt; ? wakeup_kswapd
&gt; migrate_misplaced_page
&gt; __handle_mm_fault
&gt; handle_mm_fault
&gt; do_user_addr_fault
&gt; exc_page_fault
&gt; asm_exc_page_fault
&gt; RIP: 0033:0x55b897ba0808
&gt; Code: (omitted)
&gt; RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287
&gt; RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0
&gt; RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0
&gt; RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075
&gt; R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
&gt; R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000
&gt;  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222615">SUSE bug 1222615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26787</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmci: stm32: fix DMA API overlapping mappings warning

Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning:

DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,
overlapping mappings aren't supported
WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568
add_dma_entry+0x234/0x2f4
Modules linked in:
CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1
Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)
Workqueue: events_freezable mmc_rescan
Call trace:
add_dma_entry+0x234/0x2f4
debug_dma_map_sg+0x198/0x350
__dma_map_sg_attrs+0xa0/0x110
dma_map_sg_attrs+0x10/0x2c
sdmmc_idma_prep_data+0x80/0xc0
mmci_prep_data+0x38/0x84
mmci_start_data+0x108/0x2dc
mmci_request+0xe4/0x190
__mmc_start_request+0x68/0x140
mmc_start_request+0x94/0xc0
mmc_wait_for_req+0x70/0x100
mmc_send_tuning+0x108/0x1ac
sdmmc_execute_tuning+0x14c/0x210
mmc_execute_tuning+0x48/0xec
mmc_sd_init_uhs_card.part.0+0x208/0x464
mmc_sd_init_card+0x318/0x89c
mmc_attach_sd+0xe4/0x180
mmc_rescan+0x244/0x320

DMA API debug brings to light leaking dma-mappings as dma_map_sg and
dma_unmap_sg are not correctly balanced.

If an error occurs in mmci_cmd_irq function, only mmci_dma_error
function is called and as this API is not managed on stm32 variant,
dma_unmap_sg is never called in this error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222781">SUSE bug 1222781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26788</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: init irq after reg initialization

Initialize the qDMA irqs after the registers are configured so that
interrupts that may have been pending from a primary kernel don't get
processed by the irq handler before it is ready to and cause panic with
the following trace:

  Call trace:
   fsl_qdma_queue_handler+0xf8/0x3e8
   __handle_irq_event_percpu+0x78/0x2b0
   handle_irq_event_percpu+0x1c/0x68
   handle_irq_event+0x44/0x78
   handle_fasteoi_irq+0xc8/0x178
   generic_handle_irq+0x24/0x38
   __handle_domain_irq+0x90/0x100
   gic_handle_irq+0x5c/0xb8
   el1_irq+0xb8/0x180
   _raw_spin_unlock_irqrestore+0x14/0x40
   __setup_irq+0x4bc/0x798
   request_threaded_irq+0xd8/0x190
   devm_request_threaded_irq+0x74/0xe8
   fsl_qdma_probe+0x4d4/0xca8
   platform_drv_probe+0x50/0xa0
   really_probe+0xe0/0x3f8
   driver_probe_device+0x64/0x130
   device_driver_attach+0x6c/0x78
   __driver_attach+0xbc/0x158
   bus_for_each_dev+0x5c/0x98
   driver_attach+0x20/0x28
   bus_add_driver+0x158/0x220
   driver_register+0x60/0x110
   __platform_driver_register+0x44/0x50
   fsl_qdma_driver_init+0x18/0x20
   do_one_initcall+0x48/0x258
   kernel_init_freeable+0x1a4/0x23c
   kernel_init+0x10/0xf8
   ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222783">SUSE bug 1222783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26790</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read

There is chip (ls1028a) errata:

The SoC may hang on 16 byte unaligned read transactions by QDMA.

Unaligned read transactions initiated by QDMA may stall in the NOC
(Network On-Chip), causing a deadlock condition. Stalled transactions will
trigger completion timeouts in PCIe controller.

Workaround:
Enable prefetch by setting the source descriptor prefetchable bit
( SD[PF] = 1 ).

Implement this workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222784">SUSE bug 1222784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26791</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: dev-replace: properly validate device names

There's a syzbot report that device name buffers passed to device
replace are not properly checked for string termination which could lead
to a read out of bounds in getname_kernel().

Add a helper that validates both source and target device name buffers.
For devid as the source initialize the buffer to empty string in case
something tries to read it later.

This was originally analyzed and fixed in a different way by Edward Adam
Davis (see links).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222793">SUSE bug 1222793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26792</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double free of anonymous device after snapshot creation failure

When creating a snapshot we may do a double free of an anonymous device
in case there's an error committing the transaction. The second free may
result in freeing an anonymous device number that was allocated by some
other subsystem in the kernel or another btrfs filesystem.

The steps that lead to this:

1) At ioctl.c:create_snapshot() we allocate an anonymous device number
   and assign it to pending_snapshot-&gt;anon_dev;

2) Then we call btrfs_commit_transaction() and end up at
   transaction.c:create_pending_snapshot();

3) There we call btrfs_get_new_fs_root() and pass it the anonymous device
   number stored in pending_snapshot-&gt;anon_dev;

4) btrfs_get_new_fs_root() frees that anonymous device number because
   btrfs_lookup_fs_root() returned a root - someone else did a lookup
   of the new root already, which could some task doing backref walking;

5) After that some error happens in the transaction commit path, and at
   ioctl.c:create_snapshot() we jump to the 'fail' label, and after
   that we free again the same anonymous device number, which in the
   meanwhile may have been reallocated somewhere else, because
   pending_snapshot-&gt;anon_dev still has the same value as in step 1.

Recently syzbot ran into this and reported the following trace:

  ------------[ cut here ]------------
  ida_free called for id=51 which is not allocated.
  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525
  Modules linked in:
  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525
  Code: 10 42 80 3c 28 (...)
  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246
  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000
  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000
  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4
  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246
  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246
  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346
   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837
   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931
   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404
   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848
   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998
   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044
   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306
   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393
   btrfs_ioctl+0xa74/0xd40
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:871 [inline]
   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857
   do_syscall_64+0xfb/0x240
   entry_SYSCALL_64_after_hwframe+0x6f/0x77
  RIP: 0033:0x7fca3e67dda9
  Code: 28 00 00 00 (...)
  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9
  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658
   &lt;/TASK&gt;

Where we get an explicit message where we attempt to free an anonymous
device number that is not currently allocated. It happens in a different
code path from the example below, at btrfs_get_root_ref(), so this change
may not fix the case triggered by sy
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26793</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: fix use-after-free and null-ptr-deref in gtp_newlink()

The gtp_link_ops operations structure for the subsystem must be
registered after registering the gtp_net_ops pernet operations structure.

Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:

[ 1010.702740] gtp: GTP module unloaded
[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1
[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00
[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203
[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000
[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282
[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000
[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80
[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400
[ 1010.715953] FS:  00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000
[ 1010.715958] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0
[ 1010.715968] PKRU: 55555554
[ 1010.715972] Call Trace:
[ 1010.715985]  ? __die_body.cold+0x1a/0x1f
[ 1010.715995]  ? die_addr+0x43/0x70
[ 1010.716002]  ? exc_general_protection+0x199/0x2f0
[ 1010.716016]  ? asm_exc_general_protection+0x1e/0x30
[ 1010.716026]  ? gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.716034]  ? gtp_net_exit+0x150/0x150 [gtp]
[ 1010.716042]  __rtnl_newlink+0x1063/0x1700
[ 1010.716051]  ? rtnl_setlink+0x3c0/0x3c0
[ 1010.716063]  ? is_bpf_text_address+0xc0/0x1f0
[ 1010.716070]  ? kernel_text_address.part.0+0xbb/0xd0
[ 1010.716076]  ? __kernel_text_address+0x56/0xa0
[ 1010.716084]  ? unwind_get_return_address+0x5a/0xa0
[ 1010.716091]  ? create_prof_cpu_mask+0x30/0x30
[ 1010.716098]  ? arch_stack_walk+0x9e/0xf0
[ 1010.716106]  ? stack_trace_save+0x91/0xd0
[ 1010.716113]  ? stack_trace_consume_entry+0x170/0x170
[ 1010.716121]  ? __lock_acquire+0x15c5/0x5380
[ 1010.716139]  ? mark_held_locks+0x9e/0xe0
[ 1010.716148]  ? kmem_cache_alloc_trace+0x35f/0x3c0
[ 1010.716155]  ? __rtnl_newlink+0x1700/0x1700
[ 1010.716160]  rtnl_newlink+0x69/0xa0
[ 1010.716166]  rtnetlink_rcv_msg+0x43b/0xc50
[ 1010.716172]  ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716179]  ? lock_acquire+0x1fe/0x560
[ 1010.716188]  ? netlink_deliver_tap+0x12f/0xd50
[ 1010.716196]  netlink_rcv_skb+0x14d/0x440
[ 1010.716202]  ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716208]  ? netlink_ack+0xab0/0xab0
[ 1010.716213]  ? netlink_deliver_tap+0x202/0xd50
[ 1010.716220]  ? netlink_deliver_tap+0x218/0xd50
[ 1010.716226]  ? __virt_addr_valid+0x30b/0x590
[ 1010.716233]  netlink_unicast+0x54b/0x800
[ 1010.716240]  ? netlink_attachskb+0x870/0x870
[ 1010.716248]  ? __check_object_size+0x2de/0x3b0
[ 1010.716254]  netlink_sendmsg+0x938/0xe40
[ 1010.716261]  ? netlink_unicast+0x800/0x800
[ 1010.716269]  ? __import_iovec+0x292/0x510
[ 1010.716276]  ? netlink_unicast+0x800/0x800
[ 1010.716284]  __sock_sendmsg+0x159/0x190
[ 1010.716290]  ____sys_sendmsg+0x712/0x880
[ 1010.716297]  ? sock_write_iter+0x3d0/0x3d0
[ 1010.716304]  ? __ia32_sys_recvmmsg+0x270/0x270
[ 1010.716309]  ? lock_acquire+0x1fe/0x560
[ 1010.716315]  ? drain_array_locked+0x90/0x90
[ 1010.716324]  ___sys_sendmsg+0xf8/0x170
[ 1010.716331]  ? sendmsg_copy_msghdr+0x170/0x170
[ 1010.716337]  ? lockdep_init_map
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222428">SUSE bug 1222428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: always restore the old font data in fbcon_do_set_font()

Commit a5a923038d70 (fbdev: fbcon: Properly revert changes when
vc_resize() failed) started restoring old font data upon failure (of
vc_resize()). But it performs so only for user fonts. It means that the
"system"/internal fonts are not restored at all. So in result, the very
first call to fbcon_do_set_font() performs no restore at all upon
failing vc_resize().

This can be reproduced by Syzkaller to crash the system on the next
invocation of font_get(). It's rather hard to hit the allocation failure
in vc_resize() on the first font_set(), but not impossible. Esp. if
fault injection is used to aid the execution/failure. It was
demonstrated by Sirius:
  BUG: unable to handle page fault for address: fffffffffffffff8
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0
  Oops: 0000 [#1] PREEMPT SMP KASAN
  CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:fbcon_get_font+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286
  Call Trace:
   &lt;TASK&gt;
   con_font_get drivers/tty/vt/vt.c:4558 [inline]
   con_font_op+0x1fc/0xf20 drivers/tty/vt/vt.c:4673
   vt_k_ioctl drivers/tty/vt/vt_ioctl.c:474 [inline]
   vt_ioctl+0x632/0x2ec0 drivers/tty/vt/vt_ioctl.c:752
   tty_ioctl+0x6f8/0x1570 drivers/tty/tty_io.c:2803
   vfs_ioctl fs/ioctl.c:51 [inline]
  ...

So restore the font data in any case, not only for user fonts. Note the
later 'if' is now protected by 'old_userfont' and not 'old_data' as the
latter is always set now. (And it is supposed to be non-NULL. Otherwise
we would see the bug above again.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222798">SUSE bug 1222798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26800</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix use-after-free on failed backlog decryption

When the decrypt request goes to the backlog and crypto_aead_decrypt
returns -EBUSY, tls_do_decryption will wait until all async
decryptions have completed. If one of them fails, tls_do_decryption
will return -EBADMSG and tls_decrypt_sg jumps to the error path,
releasing all the pages. But the pages have been passed to the async
callback, and have already been released by tls_decrypt_done.

The only true async case is when crypto_aead_decrypt returns
 -EINPROGRESS. With -EBUSY, we already waited so we can tell
tls_sw_recvmsg that the data is available for immediate copy, but we
need to notify tls_decrypt_sg (via the new -&gt;async_done flag) that the
memory has already been released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26801</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Avoid potential use-after-free in hci_error_reset

While handling the HCI_EV_HARDWARE_ERROR event, if the underlying
BT controller is not responding, the GPIO reset mechanism would
free the hci_dev and lead to a use-after-free in hci_error_reset.

Here's the call trace observed on a ChromeOS device with Intel AX201:
   queue_work_on+0x3e/0x6c
   __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth &lt;HASH:3b4a6&gt;]
   ? init_wait_entry+0x31/0x31
   __hci_cmd_sync+0x16/0x20 [bluetooth &lt;HASH:3b4a 6&gt;]
   hci_error_reset+0x4f/0xa4 [bluetooth &lt;HASH:3b4a 6&gt;]
   process_one_work+0x1d8/0x33f
   worker_thread+0x21b/0x373
   kthread+0x13a/0x152
   ? pr_cont_work+0x54/0x54
   ? kthread_blkcg+0x31/0x31
    ret_from_fork+0x1f/0x30

This patch holds the reference count on the hci_dev while processing
a HCI_EV_HARDWARE_ERROR event to avoid potential crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222413">SUSE bug 1222413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26802</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

stmmac: Clear variable when destroying workqueue

Currently when suspending driver and stopping workqueue it is checked whether
workqueue is not NULL and if so, it is destroyed.
Function destroy_workqueue() does drain queue and does clear variable, but
it does not set workqueue variable to NULL. This can cause kernel/module
panic if code attempts to clear workqueue that was not initialized.

This scenario is possible when resuming suspended driver in stmmac_resume(),
because there is no handling for failed stmmac_hw_setup(),
which can fail and return if DMA engine has failed to initialize,
and workqueue is initialized after DMA engine.
Should DMA engine fail to initialize, resume will proceed normally,
but interface won't work and TX queue will eventually timeout,
causing 'Reset adapter' error.
This then does destroy workqueue during reset process.
And since workqueue is initialized after DMA engine and can be skipped,
it will cause kernel/module panic.

To secure against this possible crash, set workqueue variable to NULL when
destroying workqueue.

Log/backtrace from crash goes as follows:
[88.031977]------------[ cut here ]------------
[88.031985]NETDEV WATCHDOG: eth0 (sxgmac): transmit queue 1 timed out
[88.032017]WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398
           &lt;Skipping backtrace for watchdog timeout&gt;
[88.032251]---[ end trace e70de432e4d5c2c0 ]---
[88.032282]sxgmac 16d88000.ethernet eth0: Reset adapter.
[88.036359]------------[ cut here ]------------
[88.036519]Call trace:
[88.036523] flush_workqueue+0x3e4/0x430
[88.036528] drain_workqueue+0xc4/0x160
[88.036533] destroy_workqueue+0x40/0x270
[88.036537] stmmac_fpe_stop_wq+0x4c/0x70
[88.036541] stmmac_release+0x278/0x280
[88.036546] __dev_close_many+0xcc/0x158
[88.036551] dev_close_many+0xbc/0x190
[88.036555] dev_close.part.0+0x70/0xc0
[88.036560] dev_close+0x24/0x30
[88.036564] stmmac_service_task+0x110/0x140
[88.036569] process_one_work+0x1d8/0x4a0
[88.036573] worker_thread+0x54/0x408
[88.036578] kthread+0x164/0x170
[88.036583] ret_from_fork+0x10/0x20
[88.036588]---[ end trace e70de432e4d5c2c1 ]---
[88.036597]Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222799">SUSE bug 1222799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: prevent perpetual headroom growth

syzkaller triggered following kasan splat:
BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191
[..]
 kasan_report+0xda/0x110 mm/kasan/report.c:588
 __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
 skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]
 ___skb_get_hash net/core/flow_dissector.c:1791 [inline]
 __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856
 skb_get_hash include/linux/skbuff.h:1556 [inline]
 ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748
 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592
 ...
 ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 ..
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831
 ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 ...

The splat occurs because skb-&gt;data points past skb-&gt;head allocated area.
This is because neigh layer does:
  __skb_pull(skb, skb_network_offset(skb));

... but skb_network_offset() returns a negative offset and __skb_pull()
arg is unsigned.  IOW, we skb-&gt;data gets "adjusted" by a huge value.

The negative value is returned because skb-&gt;head and skb-&gt;data distance is
more than 64k and skb-&gt;network_header (u16) has wrapped around.

The bug is in the ip_tunnel infrastructure, which can cause
dev-&gt;needed_headroom to increment ad infinitum.

The syzkaller reproducer consists of packets getting routed via a gre
tunnel, and route of gre encapsulated packets pointing at another (ipip)
tunnel.  The ipip encapsulation finds gre0 as next output device.

This results in the following pattern:

1). First packet is to be sent out via gre0.
Route lookup found an output device, ipip0.

2).
ip_tunnel_xmit for gre0 bumps gre0-&gt;needed_headroom based on the future
output device, rt.dev-&gt;needed_headroom (ipip0).

3).
ip output / start_xmit moves skb on to ipip0. which runs the same
code path again (xmit recursion).

4).
Routing step for the post-gre0-encap packet finds gre0 as output device
to use for ipip0 encapsulated packet.

tunl0-&gt;needed_headroom is then incremented based on the (already bumped)
gre0 device headroom.

This repeats for every future packet:

gre0-&gt;needed_headroom gets inflated because previous packets' ipip0 step
incremented rt-&gt;dev (gre0) headroom, and ipip0 incremented because gre0
needed_headroom was increased.

For each subsequent packet, gre/ipip0-&gt;needed_headroom grows until
post-expand-head reallocations result in a skb-&gt;head/data distance of
more than 64k.

Once that happens, skb-&gt;network_header (u16) wraps around when
pskb_expand_head tries to make sure that skb_network_offset() is unchanged
after the headroom expansion/reallocation.

After this skb_network_offset(skb) returns a different (and negative)
result post headroom expansion.

The next trip to neigh layer (or anything else that would __skb_pull the
network header) makes skb-&gt;data point to a memory location outside
skb-&gt;head area.

v2: Cap the needed_headroom update to an arbitarily chosen upperlimit to
prevent perpetual increase instead of dropping the headroom increment
completely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222629">SUSE bug 1222629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26805</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter

syzbot reported the following uninit-value access issue [1]:

netlink_to_full_skb() creates a new `skb` and puts the `skb-&gt;data`
passed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data
size is specified as `len` and passed to skb_put_data(). This `len`
is based on `skb-&gt;end` that is not data offset but buffer offset. The
`skb-&gt;end` contains data and tailroom. Since the tailroom is not
initialized when the new `skb` created, KMSAN detects uninitialized
memory area when copying the data.

This patch resolved this issue by correct the len from `skb-&gt;end` to
`skb-&gt;len`, which is the actual data offset.

BUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 copy_to_user_iter lib/iov_iter.c:24 [inline]
 iterate_ubuf include/linux/iov_iter.h:29 [inline]
 iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 iterate_and_advance include/linux/iov_iter.h:271 [inline]
 _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
 copy_to_iter include/linux/uio.h:197 [inline]
 simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532
 __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420
 skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
 skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
 packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482
 sock_recvmsg_nosec net/socket.c:1044 [inline]
 sock_recvmsg net/socket.c:1066 [inline]
 sock_read_iter+0x467/0x580 net/socket.c:1136
 call_read_iter include/linux/fs.h:2014 [inline]
 new_sync_read fs/read_write.c:389 [inline]
 vfs_read+0x8f6/0xe00 fs/read_write.c:470
 ksys_read+0x20f/0x4c0 fs/read_write.c:613
 __do_sys_read fs/read_write.c:623 [inline]
 __se_sys_read fs/read_write.c:621 [inline]
 __x64_sys_read+0x93/0xd0 fs/read_write.c:621
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was stored to memory at:
 skb_put_data include/linux/skbuff.h:2622 [inline]
 netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]
 __netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]
 __netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325
 netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]
 netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]
 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
 netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 free_pages_prepare mm/page_alloc.c:1087 [inline]
 free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347
 free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533
 release_pages+0x23d3/0x2410 mm/swap.c:1042
 free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316
 tlb_batch_pages
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222630">SUSE bug 1222630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26807</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Both cadence-quadspi -&gt;runtime_suspend() and -&gt;runtime_resume()
implementations start with:

	struct cqspi_st *cqspi = dev_get_drvdata(dev);
	struct spi_controller *host = dev_get_drvdata(dev);

This obviously cannot be correct, unless "struct cqspi_st" is the
first member of " struct spi_controller", or the other way around, but
it is not the case. "struct spi_controller" is allocated by
devm_spi_alloc_host(), which allocates an extra amount of memory for
private data, used to store "struct cqspi_st".

The -&gt;probe() function of the cadence-quadspi driver then sets the
device drvdata to store the address of the "struct cqspi_st"
structure. Therefore:

	struct cqspi_st *cqspi = dev_get_drvdata(dev);

is correct, but:

	struct spi_controller *host = dev_get_drvdata(dev);

is not, as it makes "host" point not to a "struct spi_controller" but
to the same "struct cqspi_st" structure as above.

This obviously leads to bad things (memory corruption, kernel crashes)
directly during -&gt;probe(), as -&gt;probe() enables the device using PM
runtime, leading the -&gt;runtime_resume() hook being called, which in
turns calls spi_controller_resume() with the wrong pointer.

This has at least been reported [0] to cause a kernel crash, but the
exact behavior will depend on the memory contents.

[0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/

This issue potentially affects all platforms that are currently using
the cadence-quadspi driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222801">SUSE bug 1222801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26808</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain

Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER
event is reported, otherwise a stale reference to netdevice remains in
the hook list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26812</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Create persistent INTx handler

A vulnerability exists where the eventfd for INTx signaling can be
deconfigured, which unregisters the IRQ handler but still allows
eventfds to be signaled with a NULL context through the SET_IRQS ioctl
or through unmask irqfd if the device interrupt is pending.

Ideally this could be solved with some additional locking; the igate
mutex serializes the ioctl and config space accesses, and the interrupt
handler is unregistered relative to the trigger, but the irqfd path
runs asynchronous to those.  The igate mutex cannot be acquired from the
atomic context of the eventfd wake function.  Disabling the irqfd
relative to the eventfd registration is potentially incompatible with
existing userspace.

As a result, the solution implemented here moves configuration of the
INTx interrupt handler to track the lifetime of the INTx context object
and irq_type configuration, rather than registration of a particular
trigger eventfd.  Synchronization is added between the ioctl path and
eventfd_signal() wrapper such that the eventfd trigger can be
dynamically updated relative to in-flight interrupts or irqfd callbacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222808">SUSE bug 1222808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/platform: Create persistent IRQ handlers

The vfio-platform SET_IRQS ioctl currently allows loopback triggering of
an interrupt before a signaling eventfd has been configured by the user,
which thereby allows a NULL pointer dereference.

Rather than register the IRQ relative to a valid trigger, register all
IRQs in a disabled state in the device open path.  This allows mask
operations on the IRQ to nest within the overall enable state governed
by a valid eventfd signal.  This decouples @masked, protected by the
@locked spinlock from @trigger, protected via the @igate mutex.

In doing so, it's guaranteed that changes to @trigger cannot race the
IRQ handlers because the IRQ handler is synchronously disabled before
modifying the trigger, and loopback triggering of the IRQ via ioctl is
safe due to serialization with trigger changes via igate.

For compatibility, request_irq() failures are maintained to be local to
the SET_IRQS ioctl rather than a fatal error in the open device path.
This allows, for example, a userspace driver with polling mode support
to continue to work regardless of moving the request_irq() call site.
This necessarily blocks all SET_IRQS access to the failed index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/fsl-mc: Block calling interrupt handler without trigger

The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is
initially NULL and may become NULL if the user sets the trigger
eventfd to -1.  The interrupt handler itself is guaranteed that
trigger is always valid between request_irq() and free_irq(), but
the loopback testing mechanisms to invoke the handler function
need to test the trigger.  The triggering and setting ioctl paths
both make use of igate and are therefore mutually exclusive.

The vfio-fsl-mc driver does not make use of irqfds, nor does it
support any sort of masking operations, therefore unlike vfio-pci
and vfio-platform, the flow can remain essentially unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86, relocs: Ignore relocations in .notes section

When building with CONFIG_XEN_PV=y, .text symbols are emitted into
the .notes section so that Xen can find the "startup_xen" entry point.
This information is used prior to booting the kernel, so relocations
are not useful. In fact, performing relocations against the .notes
section means that the KASLR base is exposed since /sys/kernel/notes
is world-readable.

To avoid leaking the KASLR base without breaking unprivileged tools that
are expecting to read /sys/kernel/notes, skip performing relocations in
the .notes section. The values readable in .notes are then identical to
those found in System.map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26817" ref_url="https://www.suse.com/security/cve/CVE-2024-26817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amdkfd: use calloc instead of kzalloc to avoid integer overflow

This uses calloc instead of doing the multiplication which might
overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26817/">CVE-2024-26817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26817">CVE-2024-26817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222812">SUSE bug 1222812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26820</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed

If hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER
handler cannot perform VF register successfully as the register call
is received before netvsc_probe is finished. This is because we
register register_netdevice_notifier() very early( even before
vmbus_driver_register()).
To fix this, we try to register each such matching VF( if it is visible
as a netdevice) at the end of netvsc_probe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223078">SUSE bug 1223078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26822</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: set correct id, uid and cruid for multiuser automounts

When uid, gid and cruid are not specified, we need to dynamically
set them into the filesystem context used for automounting otherwise
they'll end up reusing the values from the parent mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223011">SUSE bug 1223011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26825</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: free rx_data_reassembly skb on NCI device cleanup

rx_data_reassembly skb is stored during NCI data exchange for processing
fragmented packets. It is dropped only when the last fragment is processed
or when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.
However, the NCI device may be deallocated before that which leads to skb
leak.

As by design the rx_data_reassembly skb is bound to the NCI device and
nothing prevents the device to be freed before the skb is processed in
some way and cleaned, free it on the NCI device cleanup.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223065">SUSE bug 1223065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix underflow in parse_server_interfaces()

In this loop, we step through the buffer and after each item we check
if the size_left is greater than the minimum size we need.  However,
the problem is that "bytes_left" is type ssize_t while sizeof() is type
size_t.  That means that because of type promotion, the comparison is
done as an unsigned and if we have negative bytes left the loop
continues instead of ending.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223363">SUSE bug 1223363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26829" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ir_toy: fix a memleak in irtoy_tx

When irtoy_command fails, buf should be freed since it is allocated by
irtoy_tx, or there is a memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223027">SUSE bug 1223027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not allow untrusted VF to remove administratively set MAC

Currently when PF administratively sets VF's MAC address and the VF
is put down (VF tries to delete all MACs) then the MAC is removed
from MAC filters and primary VF MAC is zeroed.

Do not allow untrusted VF to remove primary MAC when it was set
administratively by PF.

Reproducer:
1) Create VF
2) Set VF interface up
3) Administratively set the VF's MAC
4) Put VF interface down

[root@host ~]# echo 1 &gt; /sys/class/net/enp2s0f0/device/sriov_numvfs
[root@host ~]# ip link set enp2s0f0v0 up
[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
[root@host ~]# ip link set enp2s0f0v0 down
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223012">SUSE bug 1223012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26833</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix memory leak in dm_sw_fini()

After destroying dmub_srv, the memory associated with it is
not freed, causing a memory leak:

unreferenced object 0xffff896302b45800 (size 1024):
  comm "(udev-worker)", pid 222, jiffies 4294894636
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 6265fd77):
    [&lt;ffffffff993495ed&gt;] kmalloc_trace+0x29d/0x340
    [&lt;ffffffffc0ea4a94&gt;] dm_dmub_sw_init+0xb4/0x450 [amdgpu]
    [&lt;ffffffffc0ea4e55&gt;] dm_sw_init+0x15/0x2b0 [amdgpu]
    [&lt;ffffffffc0ba8557&gt;] amdgpu_device_init+0x1417/0x24e0 [amdgpu]
    [&lt;ffffffffc0bab285&gt;] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]
    [&lt;ffffffffc0ba09c7&gt;] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]
    [&lt;ffffffff9968fd1e&gt;] local_pci_probe+0x3e/0x90
    [&lt;ffffffff996918a3&gt;] pci_device_probe+0xc3/0x230
    [&lt;ffffffff99805872&gt;] really_probe+0xe2/0x480
    [&lt;ffffffff99805c98&gt;] __driver_probe_device+0x78/0x160
    [&lt;ffffffff99805daf&gt;] driver_probe_device+0x1f/0x90
    [&lt;ffffffff9980601e&gt;] __driver_attach+0xce/0x1c0
    [&lt;ffffffff99803170&gt;] bus_for_each_dev+0x70/0xc0
    [&lt;ffffffff99804822&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffff99807245&gt;] driver_register+0x55/0x100
    [&lt;ffffffff990012d1&gt;] do_one_initcall+0x41/0x300

Fix this by freeing dmub_srv after destroying it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223036">SUSE bug 1223036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: set dormant flag on hook register failure

We need to set the dormant flag again if we fail to register
the hooks.

During memory pressure hook registration can fail and we end up
with a table marked as active but no registered hooks.

On table/base chain deletion, nf_tables will attempt to unregister
the hook again which yields a warn splat from the nftables core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222967">SUSE bug 1222967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26836</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26836" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix password opcode ordering for workstations

The Lenovo workstations require the password opcode to be run before
the attribute value is changed (if Admin password is enabled).

Tested on some Thinkpads to confirm they are OK with this order too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222968">SUSE bug 1222968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26837</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: switchdev: Skip MDB replays of deferred events on offload

Before this change, generation of the list of MDB events to replay
would race against the creation of new group memberships, either from
the IGMP/MLD snooping logic or from user configuration.

While new memberships are immediately visible to walkers of
br-&gt;mdb_list, the notification of their existence to switchdev event
subscribers is deferred until a later point in time. So if a replay
list was generated during a time that overlapped with such a window,
it would also contain a replay of the not-yet-delivered event.

The driver would thus receive two copies of what the bridge internally
considered to be one single event. On destruction of the bridge, only
a single membership deletion event was therefore sent. As a
consequence of this, drivers which reference count memberships (at
least DSA), would be left with orphan groups in their hardware
database when the bridge was destroyed.

This is only an issue when replaying additions. While deletion events
may still be pending on the deferred queue, they will already have
been removed from br-&gt;mdb_list, so no duplicates can be generated in
that scenario.

To a user this meant that old group memberships, from a bridge in
which a port was previously attached, could be reanimated (in
hardware) when the port joined a new bridge, without the new bridge's
knowledge.

For example, on an mv88e6xxx system, create a snooping bridge and
immediately add a port to it:

    root@infix-06-0b-00:~$ ip link add dev br0 up type bridge mcast_snooping 1 &amp;&amp; \
    &gt; ip link set dev x3 up master br0

And then destroy the bridge:

    root@infix-06-0b-00:~$ ip link del dev br0
    root@infix-06-0b-00:~$ mvls atu
    ADDRESS             FID  STATE      Q  F  0  1  2  3  4  5  6  7  8  9  a
    DEV:0 Marvell 88E6393X
    33:33:00:00:00:6a     1  static     -  -  0  .  .  .  .  .  .  .  .  .  .
    33:33:ff:87:e4:3f     1  static     -  -  0  .  .  .  .  .  .  .  .  .  .
    ff:ff:ff:ff:ff:ff     1  static     -  -  0  1  2  3  4  5  6  7  8  9  a
    root@infix-06-0b-00:~$

The two IPv6 groups remain in the hardware database because the
port (x3) is notified of the host's membership twice: once via the
original event and once via a replay. Since only a single delete
notification is sent, the count remains at 1 when the bridge is
destroyed.

Then add the same port (or another port belonging to the same hardware
domain) to a new bridge, this time with snooping disabled:

    root@infix-06-0b-00:~$ ip link add dev br1 up type bridge mcast_snooping 0 &amp;&amp; \
    &gt; ip link set dev x3 up master br1

All multicast, including the two IPv6 groups from br0, should now be
flooded, according to the policy of br1. But instead the old
memberships are still active in the hardware database, causing the
switch to only forward traffic to those groups towards the CPU (port
0).

Eliminate the race in two steps:

1. Grab the write-side lock of the MDB while generating the replay
   list.

This prevents new memberships from showing up while we are generating
the replay list. But it leaves the scenario in which a deferred event
was already generated, but not delivered, before we grabbed the
lock. Therefore:

2. Make sure that no deferred version of a replay event is already
   enqueued to the switchdev deferred queue, before adding it to the
   replay list, when replaying additions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222973">SUSE bug 1222973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26838</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix KASAN issue with tasklet

KASAN testing revealed the following issue assocated with freeing an IRQ.

[50006.466686] Call Trace:
[50006.466691]  &lt;IRQ&gt;
[50006.489538]  dump_stack+0x5c/0x80
[50006.493475]  print_address_description.constprop.6+0x1a/0x150
[50006.499872]  ? irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.505742]  ? irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.511644]  kasan_report.cold.11+0x7f/0x118
[50006.516572]  ? irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.522473]  irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.528232]  irdma_process_ceq+0xb2/0x400 [irdma]
[50006.533601]  ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma]
[50006.540298]  irdma_ceq_dpc+0x44/0x100 [irdma]
[50006.545306]  tasklet_action_common.isra.14+0x148/0x2c0
[50006.551096]  __do_softirq+0x1d0/0xaf8
[50006.555396]  irq_exit_rcu+0x219/0x260
[50006.559670]  irq_exit+0xa/0x20
[50006.563320]  smp_apic_timer_interrupt+0x1bf/0x690
[50006.568645]  apic_timer_interrupt+0xf/0x20
[50006.573341]  &lt;/IRQ&gt;

The issue is that a tasklet could be pending on another core racing
the delete of the irq.

Fix by insuring any scheduled tasklet is killed after deleting the
irq.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222974">SUSE bug 1222974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26839</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix a memleak in init_credit_return

When dma_alloc_coherent fails to allocate dd-&gt;cr_base[i].va,
init_credit_return should deallocate dd-&gt;cr_base and
dd-&gt;cr_base[i] that allocated before. Or those resources
would be never freed and a memleak is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222975">SUSE bug 1222975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix memory leak in cachefiles_add_cache()

The following memory leak was reported after unbinding /dev/cachefiles:

==================================================================
unreferenced object 0xffff9b674176e3c0 (size 192):
  comm "cachefilesd2", pid 680, jiffies 4294881224
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc ea38a44b):
    [&lt;ffffffff8eb8a1a5&gt;] kmem_cache_alloc+0x2d5/0x370
    [&lt;ffffffff8e917f86&gt;] prepare_creds+0x26/0x2e0
    [&lt;ffffffffc002eeef&gt;] cachefiles_determine_cache_security+0x1f/0x120
    [&lt;ffffffffc00243ec&gt;] cachefiles_add_cache+0x13c/0x3a0
    [&lt;ffffffffc0025216&gt;] cachefiles_daemon_write+0x146/0x1c0
    [&lt;ffffffff8ebc4a3b&gt;] vfs_write+0xcb/0x520
    [&lt;ffffffff8ebc5069&gt;] ksys_write+0x69/0xf0
    [&lt;ffffffff8f6d4662&gt;] do_syscall_64+0x72/0x140
    [&lt;ffffffff8f8000aa&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76
==================================================================

Put the reference count of cache_cred in cachefiles_daemon_unbind() to
fix the problem. And also put cache_cred in cachefiles_add_cache() error
branch to avoid memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26842" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26842" ref_url="https://www.suse.com/security/cve/CVE-2024-26842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix shift issue in ufshcd_clear_cmd()

When task_tag &gt;= 32 (in MCQ mode) and sizeof(unsigned int) == 4, 1U &lt;&lt;
task_tag will out of bounds for a u32 mask. Fix this up to prevent
SHIFT_ISSUE (bitwise shifts that are out of bounds for their data type).

[name:debug_monitors&amp;]Unexpected kernel BRK exception at EL1
[name:traps&amp;]Internal error: BRK handler: 00000000f2005514 [#1] PREEMPT SMP
[name:mediatek_cpufreq_hw&amp;]cpufreq stop DVFS log done
[name:mrdump&amp;]Kernel Offset: 0x1ba5800000 from 0xffffffc008000000
[name:mrdump&amp;]PHYS_OFFSET: 0x80000000
[name:mrdump&amp;]pstate: 22400005 (nzCv daif +PAN -UAO)
[name:mrdump&amp;]pc : [0xffffffdbaf52bb2c] ufshcd_clear_cmd+0x280/0x288
[name:mrdump&amp;]lr : [0xffffffdbaf52a774] ufshcd_wait_for_dev_cmd+0x3e4/0x82c
[name:mrdump&amp;]sp : ffffffc0081471b0
&lt;snip&gt;
Workqueue: ufs_eh_wq_0 ufshcd_err_handler
Call trace:
 dump_backtrace+0xf8/0x144
 show_stack+0x18/0x24
 dump_stack_lvl+0x78/0x9c
 dump_stack+0x18/0x44
 mrdump_common_die+0x254/0x480 [mrdump]
 ipanic_die+0x20/0x30 [mrdump]
 notify_die+0x15c/0x204
 die+0x10c/0x5f8
 arm64_notify_die+0x74/0x13c
 do_debug_exception+0x164/0x26c
 el1_dbg+0x64/0x80
 el1h_64_sync_handler+0x3c/0x90
 el1h_64_sync+0x68/0x6c
 ufshcd_clear_cmd+0x280/0x288
 ufshcd_wait_for_dev_cmd+0x3e4/0x82c
 ufshcd_exec_dev_cmd+0x5bc/0x9ac
 ufshcd_verify_dev_init+0x84/0x1c8
 ufshcd_probe_hba+0x724/0x1ce0
 ufshcd_host_reset_and_restore+0x260/0x574
 ufshcd_reset_and_restore+0x138/0xbd0
 ufshcd_err_handler+0x1218/0x2f28
 process_one_work+0x5fc/0x1140
 worker_thread+0x7d8/0xe20
 kthread+0x25c/0x468
 ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26842/">CVE-2024-26842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26842">CVE-2024-26842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223013">SUSE bug 1223013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26843</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: runtime: Fix potential overflow of soft-reserved region size

md_size will have been narrowed if we have &gt;= 4GB worth of pages in a
soft-reserved region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223014">SUSE bug 1223014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26845</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Add TMF to tmr_list handling

An abort that is responded to by iSCSI itself is added to tmr_list but does
not go to target core. A LUN_RESET that goes through tmr_list takes a
refcounter on the abort and waits for completion. However, the abort will
be never complete because it was not started in target core.

 Unable to locate ITT: 0x05000000 on CID: 0
 Unable to locate RefTaskTag: 0x05000000 on CID: 0.
 wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
 wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
...
 INFO: task kworker/0:2:49 blocked for more than 491 seconds.
 task:kworker/0:2     state:D stack:    0 pid:   49 ppid:     2 flags:0x00000800
 Workqueue: events target_tmr_work [target_core_mod]
Call Trace:
 __switch_to+0x2c4/0x470
 _schedule+0x314/0x1730
 schedule+0x64/0x130
 schedule_timeout+0x168/0x430
 wait_for_completion+0x140/0x270
 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]
 core_tmr_lun_reset+0x30/0xa0 [target_core_mod]
 target_tmr_work+0xc8/0x1b0 [target_core_mod]
 process_one_work+0x2d4/0x5d0
 worker_thread+0x78/0x6c0

To fix this, only add abort to tmr_list if it will be handled by target
core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223018">SUSE bug 1223018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26846</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: do not wait in vain when unloading module

The module exit path has race between deleting all controllers and
freeing 'left over IDs'. To prevent double free a synchronization
between nvme_delete_ctrl and ida_destroy has been added by the initial
commit.

There is some logic around trying to prevent from hanging forever in
wait_for_completion, though it does not handling all cases. E.g.
blktests is able to reproduce the situation where the module unload
hangs forever.

If we completely rely on the cleanup code executed from the
nvme_delete_ctrl path, all IDs will be freed eventually. This makes
calling ida_destroy unnecessary. We only have to ensure that all
nvme_delete_ctrl code has been executed before we leave
nvme_fc_exit_module. This is done by flushing the nvme_delete_wq
workqueue.

While at it, remove the unused nvme_fc_wq workqueue too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223023">SUSE bug 1223023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223030">SUSE bug 1223030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_h323: Add protection for bmp length out of range

UBSAN load reports an exception of BRK#5515 SHIFT_ISSUE:Bitwise shifts
that are out of bounds for their data type.

vmlinux   get_bitmap(b=75) + 712
&lt;net/netfilter/nf_conntrack_h323_asn1.c:0&gt;
vmlinux   decode_seq(bs=0xFFFFFFD008037000, f=0xFFFFFFD008037018, level=134443100) + 1956
&lt;net/netfilter/nf_conntrack_h323_asn1.c:592&gt;
vmlinux   decode_choice(base=0xFFFFFFD0080370F0, level=23843636) + 1216
&lt;net/netfilter/nf_conntrack_h323_asn1.c:814&gt;
vmlinux   decode_seq(f=0xFFFFFFD0080371A8, level=134443500) + 812
&lt;net/netfilter/nf_conntrack_h323_asn1.c:576&gt;
vmlinux   decode_choice(base=0xFFFFFFD008037280, level=0) + 1216
&lt;net/netfilter/nf_conntrack_h323_asn1.c:814&gt;
vmlinux   DecodeRasMessage() + 304
&lt;net/netfilter/nf_conntrack_h323_asn1.c:833&gt;
vmlinux   ras_help() + 684
&lt;net/netfilter/nf_conntrack_h323_main.c:1728&gt;
vmlinux   nf_confirm() + 188
&lt;net/netfilter/nf_conntrack_proto.c:137&gt;

Due to abnormal data in skb-&gt;data, the extension bitmap length
exceeds 32 when decoding ras message then uses the length to make
a shift operation. It will change into negative after several loop.
UBSAN load could detect a negative shift as an undefined behaviour
and reports exception.
So we add the protection to avoid the length exceeding 32. Or else
it will return out of range error and stop decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223074">SUSE bug 1223074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26852</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

syzbot found another use-after-free in ip6_route_mpath_notify() [1]

Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.

We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.

[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037

CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x167/0x540 mm/kasan/report.c:488
  kasan_report+0x142/0x180 mm/kasan/report.c:601
 rt6_fill_node+0x1460/0x1ac0
  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
 &lt;/TASK&gt;

Allocated by task 23037:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3981 [inline]
  __kmalloc+0x22e/0x490 mm/slub.c:3994
  kmalloc include/linux/slab.h:594 [inline]
  kzalloc include/linux/slab.h:711 [inline]
  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 16:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
  poison_slab_object+0xa6/0xe0 m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223059">SUSE bug 1223059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: avoid returning frame twice in XDP_REDIRECT

When a frame can not be transmitted in XDP_REDIRECT
(e.g. due to a full queue), it is necessary to free
it by calling xdp_return_frame_rx_napi.

However, this is the responsibility of the caller of
the ndo_xdp_xmit (see for example bq_xmit_all in
kernel/bpf/devmap.c) and thus calling it inside
igc_xdp_xmit (which is the ndo_xdp_xmit of the igc
driver) as well will lead to memory corruption.

In fact, bq_xmit_all expects that it can return all
frames after the last successfully transmitted one.
Therefore, break for the first not transmitted frame,
but do not call xdp_return_frame_rx_napi in igc_xdp_xmit.
This is equally implemented in other Intel drivers
such as the igb.

There are two alternatives to this that were rejected:
1. Return num_frames as all the frames would have been
   transmitted and release them inside igc_xdp_xmit.
   While it might work technically, it is not what
   the return value is meant to represent (i.e. the
   number of SUCCESSFULLY transmitted packets).
2. Rework kernel/bpf/devmap.c and all drivers to
   support non-consecutively dropped packets.
   Besides being complex, it likely has a negative
   performance impact without a significant gain
   since it is anyway unlikely that the next frame
   can be transmitted if the previous one was dropped.

The memory corruption can be reproduced with
the following script which leads to a kernel panic
after a few seconds.  It basically generates more
traffic than a i225 NIC can transmit and pushes it
via XDP_REDIRECT from a virtual interface to the
physical interface where frames get dropped.

   #!/bin/bash
   INTERFACE=enp4s0
   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`

   sudo ip link add dev veth1 type veth peer name veth2
   sudo ip link set up $INTERFACE
   sudo ip link set up veth1
   sudo ip link set up veth2

   cat &lt;&lt; EOF &gt; redirect.bpf.c

   SEC("prog")
   int redirect(struct xdp_md *ctx)
   {
       return bpf_redirect($INTERFACE_IDX, 0);
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o
   sudo ip link set veth2 xdp obj redirect.bpf.o

   cat &lt;&lt; EOF &gt; pass.bpf.c

   SEC("prog")
   int pass(struct xdp_md *ctx)
   {
       return XDP_PASS;
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o
   sudo ip link set $INTERFACE xdp obj pass.bpf.o

   cat &lt;&lt; EOF &gt; trafgen.cfg

   {
     /* Ethernet Header */
     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
     const16(ETH_P_IP),

     /* IPv4 Header */
     0b01000101, 0,   # IPv4 version, IHL, TOS
     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))
     const16(2),      # IPv4 ident
     0b01000000, 0,   # IPv4 flags, fragmentation off
     64,              # IPv4 TTL
     17,              # Protocol UDP
     csumip(14, 33),  # IPv4 checksum

     /* UDP Header */
     10,  0, 1, 1,    # IP Src - adapt as needed
     10,  0, 1, 2,    # IP Dest - adapt as needed
     const16(6666),   # UDP Src Port
     const16(6666),   # UDP Dest Port
     const16(1008),   # UDP length (UDP header 8 bytes + payload length)
     csumudp(14, 34), # UDP checksum

     /* Payload */
     fill('W', 1000),
   }
   EOF

   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223061">SUSE bug 1223061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()

The function ice_bridge_setlink() may encounter a NULL pointer dereference
if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently
in nla_for_each_nested(). To address this issue, add a check to ensure that
br_spec is not NULL before proceeding with the nested attribute iteration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223051">SUSE bug 1223051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26856</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sparx5: Fix use after free inside sparx5_del_mact_entry

Based on the static analyzis of the code it looks like when an entry
from the MAC table was removed, the entry was still used after being
freed. More precise the vid of the mac_entry was used after calling
devm_kfree on the mac_entry.
The fix consists in first using the vid of the mac_entry to delete the
entry from the HW and after that to free it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223052">SUSE bug 1223052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26857</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

geneve: make sure to pull inner header in geneve_rx()

syzbot triggered a bug in geneve_rx() [1]

Issue is similar to the one I fixed in commit 8d975c15c0cd
("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")

We have to save skb-&gt;network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.

pskb_inet_may_pull() makes sure the needed headers are in skb-&gt;head.

[1]
BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
 BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]
 BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
  geneve_rx drivers/net/geneve.c:279 [inline]
  geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
  udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108
  udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186
  udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346
  __udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422
  udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604
  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
  dst_input include/net/dst.h:461 [inline]
  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
  process_backlog+0x480/0x8b0 net/core/dev.c:5976
  __napi_poll+0xe3/0x980 net/core/dev.c:6576
  napi_poll net/core/dev.c:6645 [inline]
  net_rx_action+0x8b8/0x1870 net/core/dev.c:6778
  __do_softirq+0x1b7/0x7c5 kernel/softirq.c:553
  do_softirq+0x9a/0xf0 kernel/softirq.c:454
  __local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381
  local_bh_enable include/linux/bottom_half.h:33 [inline]
  rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]
  __dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378
  dev_queue_xmit include/linux/netdevice.h:3171 [inline]
  packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3081 [inline]
  packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  __sys_sendto+0x735/0xa10 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3819 [inline]
  slab_alloc_node mm/slub.c:3860 [inline]
  kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
  __alloc_skb+0x352/0x790 net/core/skbuff.c:651
  alloc_skb include/linux/skbuff.h:1296 [inline]
  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394
  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783
  packet_alloc_skb net/packet/af_packet.c:2930 [inline]
  packet_snd net/packet/af_packet.c:3024 [inline]
  packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  __sys_sendto+0x735/0xa10 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223058">SUSE bug 1223058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26859</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/bnx2x: Prevent access to a freed page in page_pool

Fix race condition leading to system crash during EEH error handling

During EEH error recovery, the bnx2x driver's transmit timeout logic
could cause a race condition when handling reset tasks. The
bnx2x_tx_timeout() schedules reset tasks via bnx2x_sp_rtnl_task(),
which ultimately leads to bnx2x_nic_unload(). In bnx2x_nic_unload()
SGEs are freed using bnx2x_free_rx_sge_range(). However, this could
overlap with the EEH driver's attempt to reset the device using
bnx2x_io_slot_reset(), which also tries to free SGEs. This race
condition can result in system crashes due to accessing freed memory
locations in bnx2x_free_rx_sge()

799  static inline void bnx2x_free_rx_sge(struct bnx2x *bp,
800				struct bnx2x_fastpath *fp, u16 index)
801  {
802	struct sw_rx_page *sw_buf = &amp;fp-&gt;rx_page_ring[index];
803     struct page *page = sw_buf-&gt;page;
....
where sw_buf was set to NULL after the call to dma_unmap_page()
by the preceding thread.

    EEH: Beginning: 'slot_reset'
    PCI 0011:01:00.0#10000: EEH: Invoking bnx2x-&gt;slot_reset()
    bnx2x: [bnx2x_io_slot_reset:14228(eth1)]IO slot reset initializing...
    bnx2x 0011:01:00.0: enabling device (0140 -&gt; 0142)
    bnx2x: [bnx2x_io_slot_reset:14244(eth1)]IO slot reset --&gt; driver unload
    Kernel attempted to read user page (0) - exploit attempt? (uid: 0)
    BUG: Kernel NULL pointer dereference on read at 0x00000000
    Faulting instruction address: 0xc0080000025065fc
    Oops: Kernel access of bad area, sig: 11 [#1]
    .....
    Call Trace:
    [c000000003c67a20] [c00800000250658c] bnx2x_io_slot_reset+0x204/0x610 [bnx2x] (unreliable)
    [c000000003c67af0] [c0000000000518a8] eeh_report_reset+0xb8/0xf0
    [c000000003c67b60] [c000000000052130] eeh_pe_report+0x180/0x550
    [c000000003c67c70] [c00000000005318c] eeh_handle_normal_event+0x84c/0xa60
    [c000000003c67d50] [c000000000053a84] eeh_event_handler+0xf4/0x170
    [c000000003c67da0] [c000000000194c58] kthread+0x1c8/0x1d0
    [c000000003c67e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64

To solve this issue, we need to verify page pool allocations before
freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223049">SUSE bug 1223049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: receive: annotate data-race around receiving_counter.counter

Syzkaller with KCSAN identified a data-race issue when accessing
keypair-&gt;receiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()
annotations to mark the data race as intentional.

    BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll

    write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:
     counter_validate drivers/net/wireguard/receive.c:321 [inline]
     wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461
     __napi_poll+0x60/0x3b0 net/core/dev.c:6536
     napi_poll net/core/dev.c:6605 [inline]
     net_rx_action+0x32b/0x750 net/core/dev.c:6738
     __do_softirq+0xc4/0x279 kernel/softirq.c:553
     do_softirq+0x5e/0x90 kernel/softirq.c:454
     __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381
     __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
     _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
     spin_unlock_bh include/linux/spinlock.h:396 [inline]
     ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
     wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499
     process_one_work kernel/workqueue.c:2633 [inline]
     ...

    read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:
     decrypt_packet drivers/net/wireguard/receive.c:252 [inline]
     wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501
     process_one_work kernel/workqueue.c:2633 [inline]
     process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706
     worker_thread+0x525/0x730 kernel/workqueue.c:2787
     ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223076">SUSE bug 1223076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

packet: annotate data-races around ignore_outgoing

ignore_outgoing is read locklessly from dev_queue_xmit_nit()
and packet_getsockopt()

Add appropriate READ_ONCE()/WRITE_ONCE() annotations.

syzbot reported:

BUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt

write to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:
 packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003
 do_sock_setsockopt net/socket.c:2311 [inline]
 __sys_setsockopt+0x1d8/0x250 net/socket.c:2334
 __do_sys_setsockopt net/socket.c:2343 [inline]
 __se_sys_setsockopt net/socket.c:2340 [inline]
 __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

read to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:
 dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248
 xmit_one net/core/dev.c:3527 [inline]
 dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547
 __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108
 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127
 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]
 batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]
 batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335
 worker_thread+0x526/0x730 kernel/workqueue.c:3416
 kthread+0x1d1/0x210 kernel/kthread.c:388
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243

value changed: 0x00 -&gt; 0x01

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hsr: Fix uninit-value access in hsr_get_node()

KMSAN reported the following uninit-value access issue [1]:

=====================================================
BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246
 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246
 fill_frame_info net/hsr/hsr_forward.c:577 [inline]
 hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615
 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
 __alloc_skb+0x318/0x740 net/core/skbuff.c:651
 alloc_skb include/linux/skbuff.h:1286 [inline]
 alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787
 packet_alloc_skb net/packet/af_packet.c:2936 [inline]
 packet_snd net/packet/af_packet.c:3030 [inline]
 packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================

If the packet type ID field in the Ethernet header is either ETH_P_PRP or
ETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr()
reads an invalid value as a sequence number. This causes the above issue.

This patch fixes the issue by returning NULL if the Ethernet header is not
followed by an HSR tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223021">SUSE bug 1223021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26866</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: lpspi: Avoid potential use-after-free in probe()

fsl_lpspi_probe() is allocating/disposing memory manually with
spi_alloc_host()/spi_alloc_target(), but uses
devm_spi_register_controller(). In case of error after the latter call the
memory will be explicitly freed in the probe function by
spi_controller_put() call, but used afterwards by "devm" management outside
probe() (spi_unregister_controller() &lt;- devm_spi_unregister() below).

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070
...
Call trace:
 kernfs_find_ns
 kernfs_find_and_get_ns
 sysfs_remove_group
 sysfs_remove_groups
 device_remove_attrs
 device_del
 spi_unregister_controller
 devm_spi_unregister
 release_nodes
 devres_release_all
 really_probe
 driver_probe_device
 __device_attach_driver
 bus_for_each_drv
 __device_attach
 device_initial_probe
 bus_probe_device
 deferred_probe_work_func
 process_one_work
 worker_thread
 kthread
 ret_from_fork
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223024">SUSE bug 1223024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26870</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102

A call to listxattr() with a buffer size = 0 returns the actual
size of the buffer needed for a subsequent call. When size &gt; 0,
nfs4_listxattr() does not return an error because either
generic_listxattr() or nfs4_listxattr_nfs4_label() consumes
exactly all the bytes then size is 0 when calling
nfs4_listxattr_nfs4_user() which then triggers the following
kernel BUG:

  [   99.403778] kernel BUG at mm/usercopy.c:102!
  [   99.404063] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
  [   99.408463] CPU: 0 PID: 3310 Comm: python3 Not tainted 6.6.0-61.fc40.aarch64 #1
  [   99.415827] Call trace:
  [   99.415985]  usercopy_abort+0x70/0xa0
  [   99.416227]  __check_heap_object+0x134/0x158
  [   99.416505]  check_heap_object+0x150/0x188
  [   99.416696]  __check_object_size.part.0+0x78/0x168
  [   99.416886]  __check_object_size+0x28/0x40
  [   99.417078]  listxattr+0x8c/0x120
  [   99.417252]  path_listxattr+0x78/0xe0
  [   99.417476]  __arm64_sys_listxattr+0x28/0x40
  [   99.417723]  invoke_syscall+0x78/0x100
  [   99.417929]  el0_svc_common.constprop.0+0x48/0xf0
  [   99.418186]  do_el0_svc+0x24/0x38
  [   99.418376]  el0_svc+0x3c/0x110
  [   99.418554]  el0t_64_sync_handler+0x120/0x130
  [   99.418788]  el0t_64_sync+0x194/0x198
  [   99.418994] Code: aa0003e3 d000a3e0 91310000 97f49bdb (d4210000)

Issue is reproduced when generic_listxattr() returns 'system.nfs4_acl',
thus calling lisxattr() with size = 16 will trigger the bug.

Add check on nfs4_listxattr() to return ERANGE error when it is
called with size &gt; 0 and the return value is greater than size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223113">SUSE bug 1223113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26872</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Do not register event handler until srpt device is fully setup

Upon rare occasions, KASAN reports a use-after-free Write
in srpt_refresh_port().

This seems to be because an event handler is registered before the
srpt device is fully setup and a race condition upon error may leave a
partially setup event handler in place.

Instead, only register the event handler after srpt device initialization
is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223115">SUSE bug 1223115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26874</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip

It's possible that mtk_crtc-&gt;event is NULL in
mtk_drm_crtc_finish_page_flip().

pending_needs_vblank value is set by mtk_crtc-&gt;event, but in
mtk_drm_crtc_atomic_flush(), it's is not guarded by the same
lock in mtk_drm_finish_page_flip(), thus a race condition happens.

Consider the following case:

CPU1                              CPU2
step 1:
mtk_drm_crtc_atomic_begin()
mtk_crtc-&gt;event is not null,
                                  step 1:
                                  mtk_drm_crtc_atomic_flush:
                                  mtk_drm_crtc_update_config(
                                      !!mtk_crtc-&gt;event)
step 2:
mtk_crtc_ddp_irq -&gt;
mtk_drm_finish_page_flip:
lock
mtk_crtc-&gt;event set to null,
pending_needs_vblank set to false
unlock
                                  pending_needs_vblank set to true,

                                  step 2:
                                  mtk_crtc_ddp_irq -&gt;
                                  mtk_drm_finish_page_flip called again,
                                  pending_needs_vblank is still true
                                  //null pointer

Instead of guarding the entire mtk_drm_crtc_atomic_flush(), it's more
efficient to just check if mtk_crtc-&gt;event is null before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223048">SUSE bug 1223048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26875</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pvrusb2: fix uaf in pvr2_context_set_notify

[Syzbot reported]
BUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35
Read of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26

CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Workqueue: usb_hub_wq hub_event
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc4/0x620 mm/kasan/report.c:488
 kasan_report+0xda/0x110 mm/kasan/report.c:601
 pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35
 pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]
 pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272

Freed by task 906:
kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640
poison_slab_object mm/kasan/common.c:241 [inline]
__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2121 [inline]
slab_free mm/slub.c:4299 [inline]
kfree+0x105/0x340 mm/slub.c:4409
pvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]
pvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158

[Analyze]
Task A set disconnect_flag = !0, which resulted in Task B's condition being met
and releasing mp, leading to this issue.

[Fix]
Place the disconnect_flag assignment operation after all code in pvr2_context_disconnect()
to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223118">SUSE bug 1223118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26876</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: adv7511: fix crash on irq during probe

Moved IRQ registration down to end of adv7511_probe().

If an IRQ already is pending during adv7511_probe
(before adv7511_cec_init) then cec_received_msg_ts
could crash using uninitialized data:

    Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5
    Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP
    Call trace:
     cec_received_msg_ts+0x48/0x990 [cec]
     adv7511_cec_irq_process+0x1cc/0x308 [adv7511]
     adv7511_irq_process+0xd8/0x120 [adv7511]
     adv7511_irq_handler+0x1c/0x30 [adv7511]
     irq_thread_fn+0x30/0xa0
     irq_thread+0x14c/0x238
     kthread+0x190/0x1a8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223119">SUSE bug 1223119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26877</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: xilinx - call finalize with bh disabled

When calling crypto_finalize_request, BH should be disabled to avoid
triggering the following calltrace:

    ------------[ cut here ]------------
    WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118
    Modules linked in: cryptodev(O)
    CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G           O       6.8.0-rc1-yocto-standard #323
    Hardware name: ZynqMP ZCU102 Rev1.0 (DT)
    pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    pc : crypto_finalize_request+0xa0/0x118
    lr : crypto_finalize_request+0x104/0x118
    sp : ffffffc085353ce0
    x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688
    x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00
    x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000
    x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450
    x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
    x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0
    x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8
    x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001
    x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000
    x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000
    Call trace:
     crypto_finalize_request+0xa0/0x118
     crypto_finalize_aead_request+0x18/0x30
     zynqmp_handle_aes_req+0xcc/0x388
     crypto_pump_work+0x168/0x2d8
     kthread_worker_fn+0xfc/0x3a0
     kthread+0x118/0x138
     ret_from_fork+0x10/0x20
    irq event stamp: 40
    hardirqs last  enabled at (39): [&lt;ffffffc0812416f8&gt;] _raw_spin_unlock_irqrestore+0x70/0xb0
    hardirqs last disabled at (40): [&lt;ffffffc08122d208&gt;] el1_dbg+0x28/0x90
    softirqs last  enabled at (36): [&lt;ffffffc080017dec&gt;] kernel_neon_begin+0x8c/0xf0
    softirqs last disabled at (34): [&lt;ffffffc080017dc0&gt;] kernel_neon_begin+0x60/0xf0
    ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223140">SUSE bug 1223140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26878</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

quota: Fix potential NULL pointer dereference

Below race may cause NULL pointer dereference

P1					P2
dquot_free_inode			quota_off
					  drop_dquot_ref
					   remove_dquot_ref
					   dquots = i_dquot(inode)
  dquots = i_dquot(inode)
  srcu_read_lock
  dquots[cnt]) != NULL (1)
					     dquots[type] = NULL (2)
  spin_lock(&amp;dquots[cnt]-&gt;dq_dqb_lock) (3)
   ....

If dquot_free_inode(or other routines) checks inode's quota pointers (1)
before quota_off sets it to NULL(2) and use it (3) after that, NULL pointer
dereference will be triggered.

So let's fix it by using a temporary pointer to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223060">SUSE bug 1223060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26879</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: meson: Add missing clocks to axg_clk_regmaps

Some clocks were missing from axg_clk_regmaps, which caused kernel panic
during cat /sys/kernel/debug/clk/clk_summary

[   57.349402] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001fc
...
[   57.430002] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   57.436900] pc : regmap_read+0x1c/0x88
[   57.440608] lr : clk_regmap_gate_is_enabled+0x3c/0xb0
[   57.445611] sp : ffff800082f1b690
[   57.448888] x29: ffff800082f1b690 x28: 0000000000000000 x27: ffff800080eb9a70
[   57.455961] x26: 0000000000000007 x25: 0000000000000016 x24: 0000000000000000
[   57.463033] x23: ffff800080e8b488 x22: 0000000000000015 x21: ffff00000e7e7000
[   57.470106] x20: ffff00000400ec00 x19: 0000000000000000 x18: ffffffffffffffff
[   57.477178] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000042a3000
[   57.484251] x14: 0000000000000000 x13: ffff0000042a2fec x12: 0000000005f5e100
[   57.491323] x11: abcc77118461cefd x10: 0000000000000020 x9 : ffff8000805e4b24
[   57.498396] x8 : ffff0000028063c0 x7 : ffff800082f1b710 x6 : ffff800082f1b710
[   57.505468] x5 : 00000000ffffffd0 x4 : ffff800082f1b6e0 x3 : 0000000000001000
[   57.512541] x2 : ffff800082f1b6e4 x1 : 000000000000012c x0 : 0000000000000000
[   57.519615] Call trace:
[   57.522030]  regmap_read+0x1c/0x88
[   57.525393]  clk_regmap_gate_is_enabled+0x3c/0xb0
[   57.530050]  clk_core_is_enabled+0x44/0x120
[   57.534190]  clk_summary_show_subtree+0x154/0x2f0
[   57.538847]  clk_summary_show_subtree+0x220/0x2f0
[   57.543505]  clk_summary_show_subtree+0x220/0x2f0
[   57.548162]  clk_summary_show_subtree+0x220/0x2f0
[   57.552820]  clk_summary_show_subtree+0x220/0x2f0
[   57.557477]  clk_summary_show_subtree+0x220/0x2f0
[   57.562135]  clk_summary_show_subtree+0x220/0x2f0
[   57.566792]  clk_summary_show_subtree+0x220/0x2f0
[   57.571450]  clk_summary_show+0x84/0xb8
[   57.575245]  seq_read_iter+0x1bc/0x4b8
[   57.578954]  seq_read+0x8c/0xd0
[   57.582059]  full_proxy_read+0x68/0xc8
[   57.585767]  vfs_read+0xb0/0x268
[   57.588959]  ksys_read+0x70/0x108
[   57.592236]  __arm64_sys_read+0x24/0x38
[   57.596031]  invoke_syscall+0x50/0x128
[   57.599740]  el0_svc_common.constprop.0+0x48/0xf8
[   57.604397]  do_el0_svc+0x28/0x40
[   57.607675]  el0_svc+0x34/0xb8
[   57.610694]  el0t_64_sync_handler+0x13c/0x158
[   57.615006]  el0t_64_sync+0x190/0x198
[   57.618635] Code: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00)
[   57.624668] ---[ end trace 0000000000000000 ]---

[jbrunet: add missing Fixes tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223066">SUSE bug 1223066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26880</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: call the resume method on internal suspend

There is this reported crash when experimenting with the lvm2 testsuite.
The list corruption is caused by the fact that the postsuspend and resume
methods were not paired correctly; there were two consecutive calls to the
origin_postsuspend function. The second call attempts to remove the
"hash_list" entry from a list, while it was already removed by the first
call.

Fix __dm_internal_resume so that it calls the preresume and resume
methods of the table's targets.

If a preresume method of some target fails, we are in a tricky situation.
We can't return an error because dm_internal_resume isn't supposed to
return errors. We can't return success, because then the "resume" and
"postsuspend" methods would not be paired correctly. So, we set the
DMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace
tools, but it won't cause a kernel crash.

------------[ cut here ]------------
kernel BUG at lib/list_debug.c:56!
invalid opcode: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0
&lt;snip&gt;
RSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282
RAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff
RBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058
R10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001
R13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0
FS:  00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0
Call Trace:
 &lt;TASK&gt;
 ? die+0x2d/0x80
 ? do_trap+0xeb/0xf0
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? do_error_trap+0x60/0x80
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? exc_invalid_op+0x49/0x60
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? asm_exc_invalid_op+0x16/0x20
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ? __list_del_entry_valid_or_report+0x77/0xc0
 origin_postsuspend+0x1a/0x50 [dm_snapshot]
 dm_table_postsuspend_targets+0x34/0x50 [dm_mod]
 dm_suspend+0xd8/0xf0 [dm_mod]
 dev_suspend+0x1f2/0x2f0 [dm_mod]
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ctl_ioctl+0x300/0x5f0 [dm_mod]
 dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]
 __x64_compat_sys_ioctl+0x104/0x170
 do_syscall_64+0x184/0x1b0
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0xf7e6aead
&lt;snip&gt;
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223188">SUSE bug 1223188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26881</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when 1588 is received on HIP08 devices

The HIP08 devices does not register the ptp devices, so the
hdev-&gt;ptp is NULL, but the hardware can receive 1588 messages,
and set the HNS3_RXD_TS_VLD_B bit, so, if match this case, the
access of hdev-&gt;ptp-&gt;flags will cause a kernel crash:

[ 5888.946472] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
[ 5888.946475] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
...
[ 5889.266118] pc : hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]
[ 5889.272612] lr : hclge_ptp_get_rx_hwts+0x34/0x170 [hclge]
[ 5889.279101] sp : ffff800012c3bc50
[ 5889.283516] x29: ffff800012c3bc50 x28: ffff2040002be040
[ 5889.289927] x27: ffff800009116484 x26: 0000000080007500
[ 5889.296333] x25: 0000000000000000 x24: ffff204001c6f000
[ 5889.302738] x23: ffff204144f53c00 x22: 0000000000000000
[ 5889.309134] x21: 0000000000000000 x20: ffff204004220080
[ 5889.315520] x19: ffff204144f53c00 x18: 0000000000000000
[ 5889.321897] x17: 0000000000000000 x16: 0000000000000000
[ 5889.328263] x15: 0000004000140ec8 x14: 0000000000000000
[ 5889.334617] x13: 0000000000000000 x12: 00000000010011df
[ 5889.340965] x11: bbfeff4d22000000 x10: 0000000000000000
[ 5889.347303] x9 : ffff800009402124 x8 : 0200f78811dfbb4d
[ 5889.353637] x7 : 2200000000191b01 x6 : ffff208002a7d480
[ 5889.359959] x5 : 0000000000000000 x4 : 0000000000000000
[ 5889.366271] x3 : 0000000000000000 x2 : 0000000000000000
[ 5889.372567] x1 : 0000000000000000 x0 : ffff20400095c080
[ 5889.378857] Call trace:
[ 5889.382285] hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]
[ 5889.388304] hns3_handle_bdinfo+0x324/0x410 [hns3]
[ 5889.394055] hns3_handle_rx_bd+0x60/0x150 [hns3]
[ 5889.399624] hns3_clean_rx_ring+0x84/0x170 [hns3]
[ 5889.405270] hns3_nic_common_poll+0xa8/0x220 [hns3]
[ 5889.411084] napi_poll+0xcc/0x264
[ 5889.415329] net_rx_action+0xd4/0x21c
[ 5889.419911] __do_softirq+0x130/0x358
[ 5889.424484] irq_exit+0x134/0x154
[ 5889.428700] __handle_domain_irq+0x88/0xf0
[ 5889.433684] gic_handle_irq+0x78/0x2c0
[ 5889.438319] el1_irq+0xb8/0x140
[ 5889.442354] arch_cpu_idle+0x18/0x40
[ 5889.446816] default_idle_call+0x5c/0x1c0
[ 5889.451714] cpuidle_idle_call+0x174/0x1b0
[ 5889.456692] do_idle+0xc8/0x160
[ 5889.460717] cpu_startup_entry+0x30/0xfc
[ 5889.465523] secondary_start_kernel+0x158/0x1ec
[ 5889.470936] Code: 97ffab78 f9411c14 91408294 f9457284 (f9400c80)
[ 5889.477950] SMP: stopping secondary CPUs
[ 5890.514626] SMP: failed to stop secondary CPUs 0-69,71-95
[ 5890.522951] Starting crashdump kernel...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223041">SUSE bug 1223041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26882</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()

Apply the same fix than ones found in :

8d975c15c0cd ("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")
1ca1ba465e55 ("geneve: make sure to pull inner header in geneve_rx()")

We have to save skb-&gt;network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.

pskb_inet_may_pull() makes sure the needed headers are in skb-&gt;head.

syzbot reported:
BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
 BUG: KMSAN: uninit-value in ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
  ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
  __ipgre_rcv+0x9bc/0xbc0 net/ipv4/ip_gre.c:389
  ipgre_rcv net/ipv4/ip_gre.c:411 [inline]
  gre_rcv+0x423/0x19f0 net/ipv4/ip_gre.c:447
  gre_rcv+0x2a4/0x390 net/ipv4/gre_demux.c:163
  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
  dst_input include/net/dst.h:461 [inline]
  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
  netif_receive_skb_internal net/core/dev.c:5734 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5793
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1556
  tun_get_user+0x53b9/0x66e0 drivers/net/tun.c:2009
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
  call_write_iter include/linux/fs.h:2087 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb6b/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590
  alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133
  alloc_pages+0x1be/0x1e0 mm/mempolicy.c:2204
  skb_page_frag_refill+0x2bf/0x7c0 net/core/sock.c:2909
  tun_build_skb drivers/net/tun.c:1686 [inline]
  tun_get_user+0xe0a/0x66e0 drivers/net/tun.c:1826
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
  call_write_iter include/linux/fs.h:2087 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb6b/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223034">SUSE bug 1223034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26883</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check on 32-bit arches

The stackmap code relies on roundup_pow_of_two() to compute the number
of hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code.

The commit in the fixes tag actually attempted to fix this, but the fix
did not account for the UB, so the fix only works on CPUs where an
overflow does result in a neat truncation to zero, which is not
guaranteed. Checking the value before rounding does not have this
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223035">SUSE bug 1223035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix hashtab overflow check on 32-bit arches

The hashtab code relies on roundup_pow_of_two() to compute the number of
hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code. So apply the same
fix to hashtab, by moving the overflow check to before the roundup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223189">SUSE bug 1223189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26885</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix DEVMAP_HASH overflow check on 32-bit arches

The devmap code allocates a number hash buckets equal to the next power
of two of the max_entries value provided when creating the map. When
rounding up to the next power of two, the 32-bit variable storing the
number of buckets can overflow, and the code checks for overflow by
checking if the truncated 32-bit value is equal to 0. However, on 32-bit
arches the rounding up itself can overflow mid-way through, because it
ends up doing a left-shift of 32 bits on an unsigned long value. If the
size of an unsigned long is four bytes, this is undefined behaviour, so
there is no guarantee that we'll end up with a nice and tidy 0-value at
the end.

Syzbot managed to turn this into a crash on arm32 by creating a
DEVMAP_HASH with max_entries &gt; 0x80000000 and then trying to update it.
Fix this by moving the overflow check to before the rounding up
operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223190">SUSE bug 1223190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix possible buffer overflow

struct hci_dev_info has a fixed size name[8] field so in the event that
hdev-&gt;name is bigger than that strcpy would attempt to write past its
size, so this fixes this problem by switching to use strscpy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228195">SUSE bug 1228195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26891</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected

For those endpoint devices connect to system via hotplug capable ports,
users could request a hot reset to the device by flapping device's link
through setting the slot's link control register, as pciehp_ist() DLLSC
interrupt sequence response, pciehp will unload the device driver and
then power it off. thus cause an IOMMU device-TLB invalidation (Intel
VT-d spec, or ATS Invalidation in PCIe spec r6.1) request for non-existence
target device to be sent and deadly loop to retry that request after ITE
fault triggered in interrupt context.

That would cause following continuous hard lockup warning and system hang

[ 4211.433662] pcieport 0000:17:01.0: pciehp: Slot(108): Link Down
[ 4211.433664] pcieport 0000:17:01.0: pciehp: Slot(108): Card not present
[ 4223.822591] NMI watchdog: Watchdog detected hard LOCKUP on cpu 144
[ 4223.822622] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S
         OE    kernel version xxxx
[ 4223.822623] Hardware name: vendorname xxxx 666-106,
BIOS 01.01.02.03.01 05/15/2023
[ 4223.822623] RIP: 0010:qi_submit_sync+0x2c0/0x490
[ 4223.822624] Code: 48 be 00 00 00 00 00 08 00 00 49 85 74 24 20 0f 95 c1 48 8b
 57 10 83 c1 04 83 3c 1a 03 0f 84 a2 01 00 00 49 8b 04 24 8b 70 34 &lt;40&gt; f6 c6 1
0 74 17 49 8b 04 24 8b 80 80 00 00 00 89 c2 d3 fa 41 39
[ 4223.822624] RSP: 0018:ffffc4f074f0bbb8 EFLAGS: 00000093
[ 4223.822625] RAX: ffffc4f040059000 RBX: 0000000000000014 RCX: 0000000000000005
[ 4223.822625] RDX: ffff9f3841315800 RSI: 0000000000000000 RDI: ffff9f38401a8340
[ 4223.822625] RBP: ffff9f38401a8340 R08: ffffc4f074f0bc00 R09: 0000000000000000
[ 4223.822626] R10: 0000000000000010 R11: 0000000000000018 R12: ffff9f384005e200
[ 4223.822626] R13: 0000000000000004 R14: 0000000000000046 R15: 0000000000000004
[ 4223.822626] FS:  0000000000000000(0000) GS:ffffa237ae400000(0000)
knlGS:0000000000000000
[ 4223.822627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4223.822627] CR2: 00007ffe86515d80 CR3: 000002fd3000a001 CR4: 0000000000770ee0
[ 4223.822627] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4223.822628] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 4223.822628] PKRU: 55555554
[ 4223.822628] Call Trace:
[ 4223.822628]  qi_flush_dev_iotlb+0xb1/0xd0
[ 4223.822628]  __dmar_remove_one_dev_info+0x224/0x250
[ 4223.822629]  dmar_remove_one_dev_info+0x3e/0x50
[ 4223.822629]  intel_iommu_release_device+0x1f/0x30
[ 4223.822629]  iommu_release_device+0x33/0x60
[ 4223.822629]  iommu_bus_notifier+0x7f/0x90
[ 4223.822630]  blocking_notifier_call_chain+0x60/0x90
[ 4223.822630]  device_del+0x2e5/0x420
[ 4223.822630]  pci_remove_bus_device+0x70/0x110
[ 4223.822630]  pciehp_unconfigure_device+0x7c/0x130
[ 4223.822631]  pciehp_disable_slot+0x6b/0x100
[ 4223.822631]  pciehp_handle_presence_or_link_change+0xd8/0x320
[ 4223.822631]  pciehp_ist+0x176/0x180
[ 4223.822631]  ? irq_finalize_oneshot.part.50+0x110/0x110
[ 4223.822632]  irq_thread_fn+0x19/0x50
[ 4223.822632]  irq_thread+0x104/0x190
[ 4223.822632]  ? irq_forced_thread_fn+0x90/0x90
[ 4223.822632]  ? irq_thread_check_affinity+0xe0/0xe0
[ 4223.822633]  kthread+0x114/0x130
[ 4223.822633]  ? __kthread_cancel_work+0x40/0x40
[ 4223.822633]  ret_from_fork+0x1f/0x30
[ 4223.822633] Kernel panic - not syncing: Hard LOCKUP
[ 4223.822634] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S
         OE     kernel version xxxx
[ 4223.822634] Hardware name: vendorname xxxx 666-106,
BIOS 01.01.02.03.01 05/15/2023
[ 4223.822634] Call Trace:
[ 4223.822634]  &lt;NMI&gt;
[ 4223.822635]  dump_stack+0x6d/0x88
[ 4223.822635]  panic+0x101/0x2d0
[ 4223.822635]  ? ret_from_fork+0x11/0x30
[ 4223.822635]  nmi_panic.cold.14+0xc/0xc
[ 4223.822636]  watchdog_overflow_callback.cold.8+0x6d/0x81
[ 4223.822636]  __perf_event_overflow+0x4f/0xf0
[ 4223.822636]  handle_pmi_common
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223037">SUSE bug 1223037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26893</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix double free in SMC transport cleanup path

When the generic SCMI code tears down a channel, it calls the chan_free
callback function, defined by each transport. Since multiple protocols
might share the same transport_info member, chan_free() might want to
clean up the same member multiple times within the given SCMI transport
implementation. In this case, it is SMC transport. This will lead to a NULL
pointer dereference at the second time:

    | scmi_protocol scmi_dev.1: Enabled polling mode TX channel - prot_id:16
    | arm-scmi firmware:scmi: SCMI Notifications - Core Enabled.
    | arm-scmi firmware:scmi: unable to communicate with SCMI
    | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
    | Mem abort info:
    |   ESR = 0x0000000096000004
    |   EC = 0x25: DABT (current EL), IL = 32 bits
    |   SET = 0, FnV = 0
    |   EA = 0, S1PTW = 0
    |   FSC = 0x04: level 0 translation fault
    | Data abort info:
    |   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
    |   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    |   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    | user pgtable: 4k pages, 48-bit VAs, pgdp=0000000881ef8000
    | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
    | Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
    | Modules linked in:
    | CPU: 4 PID: 1 Comm: swapper/0 Not tainted 6.7.0-rc2-00124-g455ef3d016c9-dirty #793
    | Hardware name: FVP Base RevC (DT)
    | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
    | pc : smc_chan_free+0x3c/0x6c
    | lr : smc_chan_free+0x3c/0x6c
    | Call trace:
    |  smc_chan_free+0x3c/0x6c
    |  idr_for_each+0x68/0xf8
    |  scmi_cleanup_channels.isra.0+0x2c/0x58
    |  scmi_probe+0x434/0x734
    |  platform_probe+0x68/0xd8
    |  really_probe+0x110/0x27c
    |  __driver_probe_device+0x78/0x12c
    |  driver_probe_device+0x3c/0x118
    |  __driver_attach+0x74/0x128
    |  bus_for_each_dev+0x78/0xe0
    |  driver_attach+0x24/0x30
    |  bus_add_driver+0xe4/0x1e8
    |  driver_register+0x60/0x128
    |  __platform_driver_register+0x28/0x34
    |  scmi_driver_init+0x84/0xc0
    |  do_one_initcall+0x78/0x33c
    |  kernel_init_freeable+0x2b8/0x51c
    |  kernel_init+0x24/0x130
    |  ret_from_fork+0x10/0x20
    | Code: f0004701 910a0021 aa1403e5 97b91c70 (b9400280)
    | ---[ end trace 0000000000000000 ]---

Simply check for the struct pointer being NULL before trying to access
its members, to avoid this situation.

This was found when a transport doesn't really work (for instance no SMC
service), the probe routines then tries to clean up, and triggers a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223196">SUSE bug 1223196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26894</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()

After unregistering the CPU idle device, the memory associated with
it is not freed, leading to a memory leak:

unreferenced object 0xffff896282f6c000 (size 1024):
  comm "swapper/0", pid 1, jiffies 4294893170
  hex dump (first 32 bytes):
    00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 8836a742):
    [&lt;ffffffff993495ed&gt;] kmalloc_trace+0x29d/0x340
    [&lt;ffffffff9972f3b3&gt;] acpi_processor_power_init+0xf3/0x1c0
    [&lt;ffffffff9972d263&gt;] __acpi_processor_start+0xd3/0xf0
    [&lt;ffffffff9972d2bc&gt;] acpi_processor_start+0x2c/0x50
    [&lt;ffffffff99805872&gt;] really_probe+0xe2/0x480
    [&lt;ffffffff99805c98&gt;] __driver_probe_device+0x78/0x160
    [&lt;ffffffff99805daf&gt;] driver_probe_device+0x1f/0x90
    [&lt;ffffffff9980601e&gt;] __driver_attach+0xce/0x1c0
    [&lt;ffffffff99803170&gt;] bus_for_each_dev+0x70/0xc0
    [&lt;ffffffff99804822&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffff99807245&gt;] driver_register+0x55/0x100
    [&lt;ffffffff9aee4acb&gt;] acpi_processor_driver_init+0x3b/0xc0
    [&lt;ffffffff990012d1&gt;] do_one_initcall+0x41/0x300
    [&lt;ffffffff9ae7c4b0&gt;] kernel_init_freeable+0x320/0x470
    [&lt;ffffffff99b231f6&gt;] kernel_init+0x16/0x1b0
    [&lt;ffffffff99042e6d&gt;] ret_from_fork+0x2d/0x50

Fix this by freeing the CPU idle device after unregistering it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223043">SUSE bug 1223043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26895</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces

wilc_netdev_cleanup currently triggers a KASAN warning, which can be
observed on interface registration error path, or simply by
removing the module/unbinding device from driver:

echo spi0.1 &gt; /sys/bus/spi/drivers/wilc1000_spi/unbind

==================================================================
BUG: KASAN: slab-use-after-free in wilc_netdev_cleanup+0x508/0x5cc
Read of size 4 at addr c54d1ce8 by task sh/86

CPU: 0 PID: 86 Comm: sh Not tainted 6.8.0-rc1+ #117
Hardware name: Atmel SAMA5
 unwind_backtrace from show_stack+0x18/0x1c
 show_stack from dump_stack_lvl+0x34/0x58
 dump_stack_lvl from print_report+0x154/0x500
 print_report from kasan_report+0xac/0xd8
 kasan_report from wilc_netdev_cleanup+0x508/0x5cc
 wilc_netdev_cleanup from wilc_bus_remove+0xc8/0xec
 wilc_bus_remove from spi_remove+0x8c/0xac
 spi_remove from device_release_driver_internal+0x434/0x5f8
 device_release_driver_internal from unbind_store+0xbc/0x108
 unbind_store from kernfs_fop_write_iter+0x398/0x584
 kernfs_fop_write_iter from vfs_write+0x728/0xf88
 vfs_write from ksys_write+0x110/0x1e4
 ksys_write from ret_fast_syscall+0x0/0x1c

[...]

Allocated by task 1:
 kasan_save_track+0x30/0x5c
 __kasan_kmalloc+0x8c/0x94
 __kmalloc_node+0x1cc/0x3e4
 kvmalloc_node+0x48/0x180
 alloc_netdev_mqs+0x68/0x11dc
 alloc_etherdev_mqs+0x28/0x34
 wilc_netdev_ifc_init+0x34/0x8ec
 wilc_cfg80211_init+0x690/0x910
 wilc_bus_probe+0xe0/0x4a0
 spi_probe+0x158/0x1b0
 really_probe+0x270/0xdf4
 __driver_probe_device+0x1dc/0x580
 driver_probe_device+0x60/0x140
 __driver_attach+0x228/0x5d4
 bus_for_each_dev+0x13c/0x1a8
 bus_add_driver+0x2a0/0x608
 driver_register+0x24c/0x578
 do_one_initcall+0x180/0x310
 kernel_init_freeable+0x424/0x484
 kernel_init+0x20/0x148
 ret_from_fork+0x14/0x28

Freed by task 86:
 kasan_save_track+0x30/0x5c
 kasan_save_free_info+0x38/0x58
 __kasan_slab_free+0xe4/0x140
 kfree+0xb0/0x238
 device_release+0xc0/0x2a8
 kobject_put+0x1d4/0x46c
 netdev_run_todo+0x8fc/0x11d0
 wilc_netdev_cleanup+0x1e4/0x5cc
 wilc_bus_remove+0xc8/0xec
 spi_remove+0x8c/0xac
 device_release_driver_internal+0x434/0x5f8
 unbind_store+0xbc/0x108
 kernfs_fop_write_iter+0x398/0x584
 vfs_write+0x728/0xf88
 ksys_write+0x110/0x1e4
 ret_fast_syscall+0x0/0x1c
 [...]

David Mosberger-Tan initial investigation [1] showed that this
use-after-free is due to netdevice unregistration during vif list
traversal. When unregistering a net device, since the needs_free_netdev has
been set to true during registration, the netdevice object is also freed,
and as a consequence, the corresponding vif object too, since it is
attached to it as private netdevice data. The next occurrence of the loop
then tries to access freed vif pointer to the list to move forward in the
list.

Fix this use-after-free thanks to two mechanisms:
- navigate in the list with list_for_each_entry_safe, which allows to
  safely modify the list as we go through each element. For each element,
  remove it from the list with list_del_rcu
- make sure to wait for RCU grace period end after each vif removal to make
  sure it is safe to free the corresponding vif too (through
  unregister_netdev)

Since we are in a RCU "modifier" path (not a "reader" path), and because
such path is expected not to be concurrent to any other modifier (we are
using the vif_mutex lock), we do not need to use RCU list API, that's why
we can benefit from list_for_each_entry_safe.

[1] https://lore.kernel.org/linux-wireless/ab077dbe58b1ea5de0a3b2ca21f275a07af967d2.camel@egauge.net/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223197">SUSE bug 1223197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wfx: fix memory leak when starting AP

Kmemleak reported this error:

    unreferenced object 0xd73d1180 (size 184):
      comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.245s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        00 00 00 00 00 00 00 00 1e 00 01 00 00 00 00 00  ................
      backtrace:
        [&lt;5ca11420&gt;] kmem_cache_alloc+0x20c/0x5ac
        [&lt;127bdd74&gt;] __alloc_skb+0x144/0x170
        [&lt;fb8a5e38&gt;] __netdev_alloc_skb+0x50/0x180
        [&lt;0f9fa1d5&gt;] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]
        [&lt;7accd02d&gt;] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]
        [&lt;41e25cc3&gt;] wfx_start_ap+0xc8/0x234 [wfx]
        [&lt;93a70356&gt;] ieee80211_start_ap+0x404/0x6b4 [mac80211]
        [&lt;a4a661cd&gt;] nl80211_start_ap+0x76c/0x9e0 [cfg80211]
        [&lt;47bd8b68&gt;] genl_rcv_msg+0x198/0x378
        [&lt;453ef796&gt;] netlink_rcv_skb+0xd0/0x130
        [&lt;6b7c977a&gt;] genl_rcv+0x34/0x44
        [&lt;66b2d04d&gt;] netlink_unicast+0x1b4/0x258
        [&lt;f965b9b6&gt;] netlink_sendmsg+0x1e8/0x428
        [&lt;aadb8231&gt;] ____sys_sendmsg+0x1e0/0x274
        [&lt;d2b5212d&gt;] ___sys_sendmsg+0x80/0xb4
        [&lt;69954f45&gt;] __sys_sendmsg+0x64/0xa8
    unreferenced object 0xce087000 (size 1024):
      comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.246s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        10 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............
      backtrace:
        [&lt;9a993714&gt;] __kmalloc_track_caller+0x230/0x600
        [&lt;f83ea192&gt;] kmalloc_reserve.constprop.0+0x30/0x74
        [&lt;a2c61343&gt;] __alloc_skb+0xa0/0x170
        [&lt;fb8a5e38&gt;] __netdev_alloc_skb+0x50/0x180
        [&lt;0f9fa1d5&gt;] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]
        [&lt;7accd02d&gt;] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]
        [&lt;41e25cc3&gt;] wfx_start_ap+0xc8/0x234 [wfx]
        [&lt;93a70356&gt;] ieee80211_start_ap+0x404/0x6b4 [mac80211]
        [&lt;a4a661cd&gt;] nl80211_start_ap+0x76c/0x9e0 [cfg80211]
        [&lt;47bd8b68&gt;] genl_rcv_msg+0x198/0x378
        [&lt;453ef796&gt;] netlink_rcv_skb+0xd0/0x130
        [&lt;6b7c977a&gt;] genl_rcv+0x34/0x44
        [&lt;66b2d04d&gt;] netlink_unicast+0x1b4/0x258
        [&lt;f965b9b6&gt;] netlink_sendmsg+0x1e8/0x428
        [&lt;aadb8231&gt;] ____sys_sendmsg+0x1e0/0x274
        [&lt;d2b5212d&gt;] ___sys_sendmsg+0x80/0xb4

However, since the kernel is build optimized, it seems the stack is not
accurate. It appears the issue is related to wfx_set_mfp_ap(). The issue
is obvious in this function: memory allocated by ieee80211_beacon_get()
is never released. Fixing this leak makes kmemleak happy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223042">SUSE bug 1223042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete

The ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data
structures have been fully initialised by the time it runs. However, because of
the order in which things are initialised, this is not guaranteed to be the
case, because the device is exposed to the USB subsystem before the ath9k driver
initialisation is completed.

We already committed a partial fix for this in commit:
8b3046abc99e ("ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()")

However, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event
tasklet, pairing it with an "initialisation complete" bit in the TX struct. It
seems syzbot managed to trigger the race for one of the other commands as well,
so let's just move the existing synchronisation bit to cover the whole
tasklet (setting it at the end of ath9k_htc_probe_device() instead of inside
ath9k_tx_init()).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223323">SUSE bug 1223323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

This patch is against CVE-2023-6270. The description of cve is:

  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux
  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on
  `struct net_device`, and a use-after-free can be triggered by racing
  between the free on the struct and the access through the `skbtxq`
  global queue. This could lead to a denial of service condition or
  potential code execution.

In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial
code is finished. But the net_device ifp will still be used in
later tx()-&gt;dev_queue_xmit() in kthread. Which means that the
dev_put(ifp) should NOT be called in the success path of skb
initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into
use-after-free because the net_device is freed.

This patch removed the dev_put(ifp) in the success path in
aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223017">SUSE bug 1223017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix kmemleak of rdev-&gt;serial

If kobject_add() is fail in bind_rdev_to_array(), 'rdev-&gt;serial' will be
alloc not be freed, and kmemleak occurs.

unreferenced object 0xffff88815a350000 (size 49152):
  comm "mdadm", pid 789, jiffies 4294716910
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc f773277a):
    [&lt;0000000058b0a453&gt;] kmemleak_alloc+0x61/0xe0
    [&lt;00000000366adf14&gt;] __kmalloc_large_node+0x15e/0x270
    [&lt;000000002e82961b&gt;] __kmalloc_node.cold+0x11/0x7f
    [&lt;00000000f206d60a&gt;] kvmalloc_node+0x74/0x150
    [&lt;0000000034bf3363&gt;] rdev_init_serial+0x67/0x170
    [&lt;0000000010e08fe9&gt;] mddev_create_serial_pool+0x62/0x220
    [&lt;00000000c3837bf0&gt;] bind_rdev_to_array+0x2af/0x630
    [&lt;0000000073c28560&gt;] md_add_new_disk+0x400/0x9f0
    [&lt;00000000770e30ff&gt;] md_ioctl+0x15bf/0x1c10
    [&lt;000000006cfab718&gt;] blkdev_ioctl+0x191/0x3f0
    [&lt;0000000085086a11&gt;] vfs_ioctl+0x22/0x60
    [&lt;0000000018b656fe&gt;] __x64_sys_ioctl+0xba/0xe0
    [&lt;00000000e54e675e&gt;] do_syscall_64+0x71/0x150
    [&lt;000000008b0ad622&gt;] entry_SYSCALL_64_after_hwframe+0x6c/0x74
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223046">SUSE bug 1223046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak

syzbot identified a kernel information leak vulnerability in
do_sys_name_to_handle() and issued the following report [1].

[1]
"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 _copy_to_user+0xbc/0x100 lib/usercopy.c:40
 copy_to_user include/linux/uaccess.h:191 [inline]
 do_sys_name_to_handle fs/fhandle.c:73 [inline]
 __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]
 __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94
 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94
 ...

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517
 __do_kmalloc_node mm/slab_common.c:1006 [inline]
 __kmalloc+0x121/0x3c0 mm/slab_common.c:1020
 kmalloc include/linux/slab.h:604 [inline]
 do_sys_name_to_handle fs/fhandle.c:39 [inline]
 __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]
 __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94
 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94
 ...

Bytes 18-19 of 20 are uninitialized
Memory access of size 20 starts at ffff888128a46380
Data copied to user address 0000000020000240"

Per Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to
solve the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223198">SUSE bug 1223198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security

During our fuzz testing of the connection and disconnection process at the
RFCOMM layer, we discovered this bug. By comparing the packets from a
normal connection and disconnection process with the testcase that
triggered a KASAN report. We analyzed the cause of this bug as follows:

1. In the packets captured during a normal connection, the host sends a
`Read Encryption Key Size` type of `HCI_CMD` packet
(Command Opcode: 0x1408) to the controller to inquire the length of
encryption key.After receiving this packet, the controller immediately
replies with a Command Completepacket (Event Code: 0x0e) to return the
Encryption Key Size.

2. In our fuzz test case, the timing of the controller's response to this
packet was delayed to an unexpected point: after the RFCOMM and L2CAP
layers had disconnected but before the HCI layer had disconnected.

3. After receiving the Encryption Key Size Response at the time described
in point 2, the host still called the rfcomm_check_security function.
However, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-&gt;chan-&gt;conn;`
had already been released, and when the function executed
`return hci_conn_security(conn-&gt;hcon, d-&gt;sec_level, auth_type, d-&gt;out);`,
specifically when accessing `conn-&gt;hcon`, a null-ptr-deref error occurred.

To fix this bug, check if `sk-&gt;sk_state` is BT_CLOSED before calling
rfcomm_recv_frame in rfcomm_process_rx.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26906</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()

When trying to use copy_from_kernel_nofault() to read vsyscall page
through a bpf program, the following oops was reported:

  BUG: unable to handle page fault for address: ffffffffff600000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 3231067 P4D 3231067 PUD 3233067 PMD 3235067 PTE 0
  Oops: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 20390 Comm: test_progs ...... 6.7.0+ #58
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:copy_from_kernel_nofault+0x6f/0x110
  ......
  Call Trace:
   &lt;TASK&gt;
   ? copy_from_kernel_nofault+0x6f/0x110
   bpf_probe_read_kernel+0x1d/0x50
   bpf_prog_2061065e56845f08_do_probe_read+0x51/0x8d
   trace_call_bpf+0xc5/0x1c0
   perf_call_bpf_enter.isra.0+0x69/0xb0
   perf_syscall_enter+0x13e/0x200
   syscall_trace_enter+0x188/0x1c0
   do_syscall_64+0xb5/0xe0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
   &lt;/TASK&gt;
  ......
  ---[ end trace 0000000000000000 ]---

The oops is triggered when:

1) A bpf program uses bpf_probe_read_kernel() to read from the vsyscall
page and invokes copy_from_kernel_nofault() which in turn calls
__get_user_asm().

2) Because the vsyscall page address is not readable from kernel space,
a page fault exception is triggered accordingly.

3) handle_page_fault() considers the vsyscall page address as a user
space address instead of a kernel space address. This results in the
fix-up setup by bpf not being applied and a page_fault_oops() is invoked
due to SMAP.

Considering handle_page_fault() has already considered the vsyscall page
address as a userspace address, fix the problem by disallowing vsyscall
page read for copy_from_kernel_nofault().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223202">SUSE bug 1223202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26907</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix fortify source warning while accessing Eth segment

 ------------[ cut here ]------------
 memcpy: detected field-spanning write (size 56) of single field "eseg-&gt;inline_hdr.start" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2)
 WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
 Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy
  [last unloaded: mlx_compat(OE)]
 CPU: 0 PID: 293779 Comm: ssh Tainted: G           OE      6.2.0-32-generic #32~22.04.1-Ubuntu
 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
 RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
 Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da &lt;0f&gt; 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7
 RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046
 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8
 R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80
 FS:  00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x72/0x90
  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
  ? __warn+0x8d/0x160
  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
  ? report_bug+0x1bb/0x1d0
  ? handle_bug+0x46/0x90
  ? exc_invalid_op+0x19/0x80
  ? asm_exc_invalid_op+0x1b/0x20
  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
  mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib]
  ipoib_send+0x2ec/0x770 [ib_ipoib]
  ipoib_start_xmit+0x5a0/0x770 [ib_ipoib]
  dev_hard_start_xmit+0x8e/0x1e0
  ? validate_xmit_skb_list+0x4d/0x80
  sch_direct_xmit+0x116/0x3a0
  __dev_xmit_skb+0x1fd/0x580
  __dev_queue_xmit+0x284/0x6b0
  ? _raw_spin_unlock_irq+0xe/0x50
  ? __flush_work.isra.0+0x20d/0x370
  ? push_pseudo_header+0x17/0x40 [ib_ipoib]
  neigh_connected_output+0xcd/0x110
  ip_finish_output2+0x179/0x480
  ? __smp_call_single_queue+0x61/0xa0
  __ip_finish_output+0xc3/0x190
  ip_finish_output+0x2e/0xf0
  ip_output+0x78/0x110
  ? __pfx_ip_finish_output+0x10/0x10
  ip_local_out+0x64/0x70
  __ip_queue_xmit+0x18a/0x460
  ip_queue_xmit+0x15/0x30
  __tcp_transmit_skb+0x914/0x9c0
  tcp_write_xmit+0x334/0x8d0
  tcp_push_one+0x3c/0x60
  tcp_sendmsg_locked+0x2e1/0xac0
  tcp_sendmsg+0x2d/0x50
  inet_sendmsg+0x43/0x90
  sock_sendmsg+0x68/0x80
  sock_write_iter+0x93/0x100
  vfs_write+0x326/0x3c0
  ksys_write+0xbd/0xf0
  ? do_syscall_64+0x69/0x90
  __x64_sys_write+0x19/0x30
  do_syscall_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223203">SUSE bug 1223203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Reset IH OVERFLOW_CLEAR bit

Allows us to detect subsequent IH ring buffer overflows as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223207">SUSE bug 1223207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "drm/amd: flush any delayed gfxoff on suspend entry"

commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring
callbacks") caused GFXOFF control to be used more heavily and the
codepath that was removed from commit 0dee72639533 ("drm/amd: flush any
delayed gfxoff on suspend entry") now can be exercised at suspend again.

Users report that by using GNOME to suspend the lockscreen trigger will
cause SDMA traffic and the system can deadlock.

This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223137">SUSE bug 1223137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26917</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: Revert "scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock"

This reverts commit 1a1975551943f681772720f639ff42fbaa746212.

This commit causes interrupts to be lost for FCoE devices, since it changed
sping locks from "bh" to "irqsave".

Instead, a work queue should be used, and will be addressed in a separate
commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223056">SUSE bug 1223056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: ulpi: Fix debugfs directory leak

The ULPI per-device debugfs root is named after the ulpi device's
parent, but ulpi_unregister_interface tries to remove a debugfs
directory named after the ulpi device itself. This results in the
directory sticking around and preventing subsequent (deferred) probes
from succeeding. Change the directory name to match the ulpi device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223847">SUSE bug 1223847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26920</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/trigger: Fix to return error if failed to alloc snapshot

Fix register_snapshot_trigger() to return error code if it failed to
allocate a snapshot instead of 0 (success). Unless that, it will register
snapshot trigger without an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228237">SUSE bug 1228237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: inet_defrag: prevent sk release while still in use

ip_local_out() and other functions can pass skb-&gt;sk as function argument.

If the skb is a fragment and reassembly happens before such function call
returns, the sk must not be released.

This affects skb fragments reassembled via netfilter or similar
modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.

Eric Dumazet made an initial analysis of this bug.  Quoting Eric:
  Calling ip_defrag() in output path is also implying skb_orphan(),
  which is buggy because output path relies on sk not disappearing.

  A relevant old patch about the issue was :
  8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()")

  [..]

  net/ipv4/ip_output.c depends on skb-&gt;sk being set, and probably to an
  inet socket, not an arbitrary one.

  If we orphan the packet in ipvlan, then downstream things like FQ
  packet scheduler will not work properly.

  We need to change ip_defrag() to only use skb_orphan() when really
  needed, ie whenever frag_list is going to be used.

Eric suggested to stash sk in fragment queue and made an initial patch.
However there is a problem with this:

If skb is refragmented again right after, ip_do_fragment() will copy
head-&gt;sk to the new fragments, and sets up destructor to sock_wfree.
IOW, we have no choice but to fix up sk_wmem accouting to reflect the
fully reassembled skb, else wmem will underflow.

This change moves the orphan down into the core, to last possible moment.
As ip_defrag_offset is aliased with sk_buff-&gt;sk member, we must move the
offset into the FRAG_CB, else skb-&gt;sk gets clobbered.

This allows to delay the orphaning long enough to learn if the skb has
to be queued or if the skb is completing the reasm queue.

In the former case, things work as before, skb is orphaned.  This is
safe because skb gets queued/stolen and won't continue past reasm engine.

In the latter case, we will steal the skb-&gt;sk reference, reattach it to
the head skb, and fix up wmem accouting when inet_frag inflates truesize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223139">SUSE bug 1223139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26922</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate the parameters of bo mapping operations more clearly

Verify the parameters of
amdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223315">SUSE bug 1223315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2797-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix garbage collector racing against connect()

Garbage collector does not take into account the risk of embryo getting
enqueued during the garbage collection. If such embryo has a peer that
carries SCM_RIGHTS, two consecutive passes of scan_children() may see a
different set of children. Leading to an incorrectly elevated inflight
count, and then a dangling pointer within the gc_inflight_list.

sockets are AF_UNIX/SOCK_STREAM
S is an unconnected socket
L is a listening in-flight socket bound to addr, not in fdtable
V's fd will be passed via sendmsg(), gets inflight count bumped

connect(S, addr)	sendmsg(S, [V]); close(V)	__unix_gc()
----------------	-------------------------	-----------

NS = unix_create1()
skb1 = sock_wmalloc(NS)
L = unix_find_other(addr)
unix_state_lock(L)
unix_peer(S) = NS
			// V count=1 inflight=0

 			NS = unix_peer(S)
 			skb2 = sock_alloc()
			skb_queue_tail(NS, skb2[V])

			// V became in-flight
			// V count=2 inflight=1

			close(V)

			// V count=1 inflight=1
			// GC candidate condition met

						for u in gc_inflight_list:
						  if (total_refs == inflight_refs)
						    add u to gc_candidates

						// gc_candidates={L, V}

						for u in gc_candidates:
						  scan_children(u, dec_inflight)

						// embryo (skb1) was not
						// reachable from L yet, so V's
						// inflight remains unchanged
__skb_queue_tail(L, skb1)
unix_state_unlock(L)
						for u in gc_candidates:
						  if (u.inflight)
						    scan_children(u, inc_inflight_move_tail)

						// V count=1 inflight=2 (!)

If there is a GC-candidate listening socket, lock/unlock its state. This
makes GC wait until the end of any ongoing connect() to that socket. After
flipping the lock, a possibly SCM-laden embryo is already enqueued. And if
there is another embryo coming, it can not possibly carry SCM_RIGHTS. At
this point, unix_inflight() can not happen because unix_gc_lock is already
taken. Inflight graph remains unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223683">SUSE bug 1223683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path

The commit mutex should not be released during the critical section
between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
worker could collect expired objects and get the released commit lock
within the same GC sequence.

nf_tables_module_autoload() temporarily releases the mutex to load
module dependencies, then it goes back to replay the transaction again.
Move it at the end of the abort phase after nft_gc_seq_end() is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224175">SUSE bug 1224175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26927</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Add some bounds checking to firmware data

Smatch complains about "head-&gt;full_size - head-&gt;header_size" can
underflow.  To some extent, we're always going to have to trust the
firmware a bit.  However, it's easy enough to add a check for negatives,
and let's add a upper bounds check as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223525">SUSE bug 1223525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26928</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_debug_files_proc_show()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223716">SUSE bug 1223716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer

Coverity scan reported potential risk of double free of the pointer
ha-&gt;vp_map.  ha-&gt;vp_map was freed in qla2x00_mem_alloc(), and again freed
in function qla2x00_mem_free(ha).

Assign NULL to vp_map and kfree take care of NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223681">SUSE bug 1223681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix command flush on cable pull

System crash due to command failed to flush back to SCSI layer.

 BUG: unable to handle kernel NULL pointer dereference at 0000000000000000
 PGD 0 P4D 0
 Oops: 0000 [#1] SMP NOPTI
 CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-372.9.1.el8.x86_64 #1
 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021
 Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]
 RIP: 0010:__wake_up_common+0x4c/0x190
 Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 &lt;49&gt; 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75
 RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086
 RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000
 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320
 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8
 R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20
 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  __wake_up_common_lock+0x7c/0xc0
  qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]
 qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0
 ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]
 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.
  ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]
 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1
 ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]
 qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0
  ? __switch_to+0x10c/0x450
 ? process_one_work+0x1a7/0x360
 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.
  ? worker_thread+0x1ce/0x390
  ? create_worker+0x1a0/0x1a0
 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70
  ? kthread+0x10a/0x120
 qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8
  ? set_kthread_struct+0x40/0x40
 qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.
  ? ret_from_fork+0x1f/0x40
 qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout

The system was under memory stress where driver was not able to allocate an
SRB to carry out error recovery of cable pull.  The failure to flush causes
upper layer to start modifying scsi_cmnd.  When the system frees up some
memory, the subsequent cable pull trigger another command flush. At this
point the driver access a null pointer when attempting to DMA unmap the
SGL.

Add a check to make sure commands are flush back on session tear down to
prevent the null pointer access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223627">SUSE bug 1223627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26933</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in port "disable" sysfs attribute

The show and store callback routines for the "disable" sysfs attribute
file in port.c acquire the device lock for the port's parent hub
device.  This can cause problems if another process has locked the hub
to remove it or change its configuration:

	Removing the hub or changing its configuration requires the
	hub interface to be removed, which requires the port device
	to be removed, and device_del() waits until all outstanding
	sysfs attribute callbacks for the ports have returned.  The
	lock can't be released until then.

	But the disable_show() or disable_store() routine can't return
	until after it has acquired the lock.

The resulting deadlock can be avoided by calling
sysfs_break_active_protection().  This will cause the sysfs core not
to wait for the attribute's callback routine to return, allowing the
removal to proceed.  The disadvantage is that after making this call,
there is no guarantee that the hub structure won't be deallocated at
any moment.  To prevent this, we have to acquire a reference to it
first by calling hub_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223670">SUSE bug 1223670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in usb_deauthorize_interface()

Among the attribute file callback routines in
drivers/usb/core/sysfs.c, the interface_authorized_store() function is
the only one which acquires a device lock on an ancestor device: It
calls usb_deauthorize_interface(), which locks the interface's parent
USB device.

The will lead to deadlock if another process already owns that lock
and tries to remove the interface, whether through a configuration
change or because the device has been disconnected.  As part of the
removal procedure, device_del() waits for all ongoing sysfs attribute
callbacks to complete.  But usb_deauthorize_interface() can't complete
until the device lock has been released, and the lock won't be
released until the removal has finished.

The mechanism provided by sysfs to prevent this kind of deadlock is
to use the sysfs_break_active_protection() function, which tells sysfs
not to wait for the attribute callback.

Reported-and-tested by: Yue Sun &lt;samsun1006219@gmail.com&gt;
Reported by: xingwei lee &lt;xrivendell7@gmail.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223671">SUSE bug 1223671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26935</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix unremoved procfs host directory regression

Commit fc663711b944 ("scsi: core: Remove the /proc/scsi/${proc_name}
directory earlier") fixed a bug related to modules loading/unloading, by
adding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led
to a potential duplicate call to the hostdir_rm() routine, since it's also
called from scsi_host_dev_release(). That triggered a regression report,
which was then fixed by commit be03df3d4bfe ("scsi: core: Fix a procfs host
directory removal regression"). The fix just dropped the hostdir_rm() call
from dev_release().

But it happens that this proc directory is created on scsi_host_alloc(),
and that function "pairs" with scsi_host_dev_release(), while
scsi_remove_host() pairs with scsi_add_host(). In other words, it seems the
reason for removing the proc directory on dev_release() was meant to cover
cases in which a SCSI host structure was allocated, but the call to
scsi_add_host() didn't happen. And that pattern happens to exist in some
error paths, for example.

Syzkaller causes that by using USB raw gadget device, error'ing on
usb-storage driver, at usb_stor_probe2(). By checking that path, we can see
that the BadDevice label leads to a scsi_host_put() after a SCSI host
allocation, but there's no call to scsi_add_host() in such path. That leads
to messages like this in dmesg (and a leak of the SCSI host proc
structure):

usb-storage 4-1:87.51: USB Mass Storage device detected
proc_dir_entry 'scsi/usb-storage' already registered
WARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376

The proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),
but guard that with the state check for SHOST_CREATED; there is even a
comment in scsi_host_dev_release() detailing that: such conditional is
meant for cases where the SCSI host was allocated but there was no calls to
{add,remove}_host(), like the usb-storage case.

This is what we propose here and with that, the error path of usb-storage
does not trigger the warning anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-14"/>
	<updated date="2024-11-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26937</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Reset queue_priority_hint on parking

Originally, with strict in order execution, we could complete execution
only when the queue was empty. Preempt-to-busy allows replacement of an
active request that may complete before the preemption is processed by
HW. If that happens, the request is retired from the queue, but the
queue_priority_hint remains set, preventing direct submission until
after the next CS interrupt is processed.

This preempt-to-busy race can be triggered by the heartbeat, which will
also act as the power-management barrier and upon completion allow us to
idle the HW. We may process the completion of the heartbeat, and begin
parking the engine before the CS event that restores the
queue_priority_hint, causing us to fail the assertion that it is MIN.

&lt;3&gt;[  166.210729] __engine_park:283 GEM_BUG_ON(engine-&gt;sched_engine-&gt;queue_priority_hint != (-((int)(~0U &gt;&gt; 1)) - 1))
&lt;0&gt;[  166.210781] Dumping ftrace buffer:
&lt;0&gt;[  166.210795] ---------------------------------
...
&lt;0&gt;[  167.302811] drm_fdin-1097      2..s1. 165741070us : trace_ports: 0000:00:02.0 rcs0: promote { ccid:20 1217:2 prio 0 }
&lt;0&gt;[  167.302861] drm_fdin-1097      2d.s2. 165741072us : execlists_submission_tasklet: 0000:00:02.0 rcs0: preempting last=1217:2, prio=0, hint=2147483646
&lt;0&gt;[  167.302928] drm_fdin-1097      2d.s2. 165741072us : __i915_request_unsubmit: 0000:00:02.0 rcs0: fence 1217:2, current 0
&lt;0&gt;[  167.302992] drm_fdin-1097      2d.s2. 165741073us : __i915_request_submit: 0000:00:02.0 rcs0: fence 3:4660, current 4659
&lt;0&gt;[  167.303044] drm_fdin-1097      2d.s1. 165741076us : execlists_submission_tasklet: 0000:00:02.0 rcs0: context:3 schedule-in, ccid:40
&lt;0&gt;[  167.303095] drm_fdin-1097      2d.s1. 165741077us : trace_ports: 0000:00:02.0 rcs0: submit { ccid:40 3:4660* prio 2147483646 }
&lt;0&gt;[  167.303159] kworker/-89       11..... 165741139us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence c90:2, current 2
&lt;0&gt;[  167.303208] kworker/-89       11..... 165741148us : __intel_context_do_unpin: 0000:00:02.0 rcs0: context:c90 unpin
&lt;0&gt;[  167.303272] kworker/-89       11..... 165741159us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence 1217:2, current 2
&lt;0&gt;[  167.303321] kworker/-89       11..... 165741166us : __intel_context_do_unpin: 0000:00:02.0 rcs0: context:1217 unpin
&lt;0&gt;[  167.303384] kworker/-89       11..... 165741170us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence 3:4660, current 4660
&lt;0&gt;[  167.303434] kworker/-89       11d..1. 165741172us : __intel_context_retire: 0000:00:02.0 rcs0: context:1216 retire runtime: { total:56028ns, avg:56028ns }
&lt;0&gt;[  167.303484] kworker/-89       11..... 165741198us : __engine_park: 0000:00:02.0 rcs0: parked
&lt;0&gt;[  167.303534]   &lt;idle&gt;-0         5d.H3. 165741207us : execlists_irq_handler: 0000:00:02.0 rcs0: semaphore yield: 00000040
&lt;0&gt;[  167.303583] kworker/-89       11..... 165741397us : __intel_context_retire: 0000:00:02.0 rcs0: context:1217 retire runtime: { total:325575ns, avg:0ns }
&lt;0&gt;[  167.303756] kworker/-89       11..... 165741777us : __intel_context_retire: 0000:00:02.0 rcs0: context:c90 retire runtime: { total:0ns, avg:0ns }
&lt;0&gt;[  167.303806] kworker/-89       11..... 165742017us : __engine_park: __engine_park:283 GEM_BUG_ON(engine-&gt;sched_engine-&gt;queue_priority_hint != (-((int)(~0U &gt;&gt; 1)) - 1))
&lt;0&gt;[  167.303811] ---------------------------------
&lt;4&gt;[  167.304722] ------------[ cut here ]------------
&lt;2&gt;[  167.304725] kernel BUG at drivers/gpu/drm/i915/gt/intel_engine_pm.c:283!
&lt;4&gt;[  167.304731] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt;[  167.304734] CPU: 11 PID: 89 Comm: kworker/11:1 Tainted: G        W          6.8.0-rc2-CI_DRM_14193-gc655e0fd2804+ #1
&lt;4&gt;[  167.304736] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022
&lt;4&gt;[  167.304738] Workqueue: i915-unordered retire_work_handler [i915]
&lt;4&gt;[  16
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223677">SUSE bug 1223677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()

If we have no VBT, or the VBT didn't declare the encoder
in question, we won't have the 'devdata' for the encoder.
Instead of oopsing just bail early.

We won't be able to tell whether the port is DP++ or not,
but so be it.

(cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223678">SUSE bug 1223678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/vma: Fix UAF on destroy against retire race

Object debugging tools were sporadically reporting illegal attempts to
free a still active i915 VMA object when parking a GT believed to be idle.

[161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915]
[161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0
...
[161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1
[161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022
[161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915]
[161.360592] RIP: 0010:debug_print_object+0x80/0xb0
...
[161.361347] debug_object_free+0xeb/0x110
[161.361362] i915_active_fini+0x14/0x130 [i915]
[161.361866] release_references+0xfe/0x1f0 [i915]
[161.362543] i915_vma_parked+0x1db/0x380 [i915]
[161.363129] __gt_park+0x121/0x230 [i915]
[161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915]

That has been tracked down to be happening when another thread is
deactivating the VMA inside __active_retire() helper, after the VMA's
active counter has been already decremented to 0, but before deactivation
of the VMA's object is reported to the object debugging tool.

We could prevent from that race by serializing i915_active_fini() with
__active_retire() via ref-&gt;tree_lock, but that wouldn't stop the VMA from
being used, e.g. from __i915_vma_retire() called at the end of
__active_retire(), after that VMA has been already freed by a concurrent
i915_vma_destroy() on return from the i915_active_fini().  Then, we should
rather fix the issue at the VMA level, not in i915_active.

Since __i915_vma_parked() is called from __gt_park() on last put of the
GT's wakeref, the issue could be addressed by holding the GT wakeref long
enough for __active_retire() to complete before that wakeref is released
and the GT parked.

I believe the issue was introduced by commit d93939730347 ("drm/i915:
Remove the vma refcount") which moved a call to i915_active_fini() from
a dropped i915_vma_release(), called on last put of the removed VMA kref,
to i915_vma_parked() processing path called on last put of a GT wakeref.
However, its visibility to the object debugging tool was suppressed by a
bug in i915_active that was fixed two weeks later with commit e92eb246feb9
("drm/i915/active: Fix missing debug object activation").

A VMA associated with a request doesn't acquire a GT wakeref by itself.
Instead, it depends on a wakeref held directly by the request's active
intel_context for a GT associated with its VM, and indirectly on that
intel_context's engine wakeref if the engine belongs to the same GT as the
VMA's VM.  Those wakerefs are released asynchronously to VMA deactivation.

Fix the issue by getting a wakeref for the VMA's GT when activating it,
and putting that wakeref only after the VMA is deactivated.  However,
exclude global GTT from that processing path, otherwise the GPU never goes
idle.  Since __i915_vma_retire() may be called from atomic contexts, use
async variant of wakeref put.  Also, to avoid circular locking dependency,
take care of acquiring the wakeref before VM mutex when both are needed.

v7: Add inline comments with justifications for:
    - using untracked variants of intel_gt_pm_get/put() (Nirmoy),
    - using async variant of _put(),
    - not getting the wakeref in case of a global GTT,
    - always getting the first wakeref outside vm-&gt;mutex.
v6: Since __i915_vma_active/retire() callbacks are not serialized, storing
    a wakeref tracking handle inside struct i915_vma is not safe, and
    there is no other good place for that.  Use untracked variants of
    intel_gt_pm_get/put_async().
v5: Replace "tile" with "GT" across commit description (Rodrigo),
  - 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223679">SUSE bug 1223679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223680">SUSE bug 1223680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26940</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed

The driver creates /sys/kernel/debug/dri/0/mob_ttm even when the
corresponding ttm_resource_manager is not allocated.
This leads to a crash when trying to read from this file.

Add a check to create mob_ttm, system_mob_ttm, and gmr_ttm debug file
only when the corresponding ttm_resource_manager is allocated.

crash&gt; bt
PID: 3133409  TASK: ffff8fe4834a5000  CPU: 3    COMMAND: "grep"
 #0 [ffffb954506b3b20] machine_kexec at ffffffffb2a6bec3
 #1 [ffffb954506b3b78] __crash_kexec at ffffffffb2bb598a
 #2 [ffffb954506b3c38] crash_kexec at ffffffffb2bb68c1
 #3 [ffffb954506b3c50] oops_end at ffffffffb2a2a9b1
 #4 [ffffb954506b3c70] no_context at ffffffffb2a7e913
 #5 [ffffb954506b3cc8] __bad_area_nosemaphore at ffffffffb2a7ec8c
 #6 [ffffb954506b3d10] do_page_fault at ffffffffb2a7f887
 #7 [ffffb954506b3d40] page_fault at ffffffffb360116e
    [exception RIP: ttm_resource_manager_debug+0x11]
    RIP: ffffffffc04afd11  RSP: ffffb954506b3df0  RFLAGS: 00010246
    RAX: ffff8fe41a6d1200  RBX: 0000000000000000  RCX: 0000000000000940
    RDX: 0000000000000000  RSI: ffffffffc04b4338  RDI: 0000000000000000
    RBP: ffffb954506b3e08   R8: ffff8fee3ffad000   R9: 0000000000000000
    R10: ffff8fe41a76a000  R11: 0000000000000001  R12: 00000000ffffffff
    R13: 0000000000000001  R14: ffff8fe5bb6f3900  R15: ffff8fe41a6d1200
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 #8 [ffffb954506b3e00] ttm_resource_manager_show at ffffffffc04afde7 [ttm]
 #9 [ffffb954506b3e30] seq_read at ffffffffb2d8f9f3
    RIP: 00007f4c4eda8985  RSP: 00007ffdbba9e9f8  RFLAGS: 00000246
    RAX: ffffffffffffffda  RBX: 000000000037e000  RCX: 00007f4c4eda8985
    RDX: 000000000037e000  RSI: 00007f4c41573000  RDI: 0000000000000003
    RBP: 000000000037e000   R8: 0000000000000000   R9: 000000000037fe30
    R10: 0000000000000000  R11: 0000000000000246  R12: 00007f4c41573000
    R13: 0000000000000003  R14: 00007f4c41572010  R15: 0000000000000003
    ORIG_RAX: 0000000000000000  CS: 0033  SS: 002b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223718">SUSE bug 1223718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26943</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/dmem: handle kcalloc() allocation failure

The kcalloc() in nouveau_dmem_evict_chunk() will return null if
the physical memory has run out. As a result, if we dereference
src_pfns, dst_pfns or dma_addrs, the null pointer dereference bugs
will happen.

Moreover, the GPU is going away. If the kcalloc() fails, we could not
evict all pages mapping a chunk. So this patch adds a __GFP_NOFAIL
flag in kcalloc().

Finally, as there is no need to have physically contiguous memory,
this patch switches kcalloc() to kvcalloc() in order to avoid
failing allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230527">SUSE bug 1230527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26948</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add a dc_state NULL check in dc_state_release

[How]
Check wheather state is NULL before releasing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223664">SUSE bug 1223664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26950</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: access device through ctx instead of peer

The previous commit fixed a bug that led to a NULL peer-&gt;device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx-&gt;wg. This semantically makes more sense
too, since ctx-&gt;wg-&gt;peer_allowedips.seq is compared with
ctx-&gt;allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223661">SUSE bug 1223661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26951</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: check for dangling peer via is_dead instead of empty list

If all peers are removed via wg_peer_remove_all(), rather than setting
peer_list to empty, the peer is added to a temporary list with a head on
the stack of wg_peer_remove_all(). If a netlink dump is resumed and the
cursored peer is one that has been removed via wg_peer_remove_all(), it
will iterate from that peer and then attempt to dump freed peers.

Fix this by instead checking peer-&gt;is_dead, which was explictly created
for this purpose. Also move up the device_update_lock lockdep assertion,
since reading is_dead relies on that.

It can be reproduced by a small script like:

    echo "Setting config..."
    ip link add dev wg0 type wireguard
    wg setconf wg0 /big-config
    (
            while true; do
                    echo "Showing config..."
                    wg showconf wg0 &gt; /dev/null
            done
    ) &amp;
    sleep 4
    wg setconf wg0 &lt;(printf "[Peer]\nPublicKey=$(wg genkey)\n")

Resulting in:

    BUG: KASAN: slab-use-after-free in __lock_acquire+0x182a/0x1b20
    Read of size 8 at addr ffff88811956ec70 by task wg/59
    CPU: 2 PID: 59 Comm: wg Not tainted 6.8.0-rc2-debug+ #5
    Call Trace:
     &lt;TASK&gt;
     dump_stack_lvl+0x47/0x70
     print_address_description.constprop.0+0x2c/0x380
     print_report+0xab/0x250
     kasan_report+0xba/0xf0
     __lock_acquire+0x182a/0x1b20
     lock_acquire+0x191/0x4b0
     down_read+0x80/0x440
     get_peer+0x140/0xcb0
     wg_get_device_dump+0x471/0x1130
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223660">SUSE bug 1223660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26953" ref_url="https://www.suse.com/security/cve/CVE-2024-26953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: esp: fix bad handling of pages from page_pool

When the skb is reorganized during esp_output (!esp-&gt;inline), the pages
coming from the original skb fragments are supposed to be released back
to the system through put_page. But if the skb fragment pages are
originating from a page_pool, calling put_page on them will trigger a
page_pool leak which will eventually result in a crash.

This leak can be easily observed when using CONFIG_DEBUG_VM and doing
ipsec + gre (non offloaded) forwarding:

  BUG: Bad page state in process ksoftirqd/16  pfn:1451b6
  page:00000000de2b8d32 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1451b6000 pfn:0x1451b6
  flags: 0x200000000000000(node=0|zone=2)
  page_type: 0xffffffff()
  raw: 0200000000000000 dead000000000040 ffff88810d23c000 0000000000000000
  raw: 00000001451b6000 0000000000000001 00000000ffffffff 0000000000000000
  page dumped because: page_pool leak
  Modules linked in: ip_gre gre mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat nf_nat xt_addrtype br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay zram zsmalloc fuse [last unloaded: mlx5_core]
  CPU: 16 PID: 96 Comm: ksoftirqd/16 Not tainted 6.8.0-rc4+ #22
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x36/0x50
   bad_page+0x70/0xf0
   free_unref_page_prepare+0x27a/0x460
   free_unref_page+0x38/0x120
   esp_ssg_unref.isra.0+0x15f/0x200
   esp_output_tail+0x66d/0x780
   esp_xmit+0x2c5/0x360
   validate_xmit_xfrm+0x313/0x370
   ? validate_xmit_skb+0x1d/0x330
   validate_xmit_skb_list+0x4c/0x70
   sch_direct_xmit+0x23e/0x350
   __dev_queue_xmit+0x337/0xba0
   ? nf_hook_slow+0x3f/0xd0
   ip_finish_output2+0x25e/0x580
   iptunnel_xmit+0x19b/0x240
   ip_tunnel_xmit+0x5fb/0xb60
   ipgre_xmit+0x14d/0x280 [ip_gre]
   dev_hard_start_xmit+0xc3/0x1c0
   __dev_queue_xmit+0x208/0xba0
   ? nf_hook_slow+0x3f/0xd0
   ip_finish_output2+0x1ca/0x580
   ip_sublist_rcv_finish+0x32/0x40
   ip_sublist_rcv+0x1b2/0x1f0
   ? ip_rcv_finish_core.constprop.0+0x460/0x460
   ip_list_rcv+0x103/0x130
   __netif_receive_skb_list_core+0x181/0x1e0
   netif_receive_skb_list_internal+0x1b3/0x2c0
   napi_gro_receive+0xc8/0x200
   gro_cell_poll+0x52/0x90
   __napi_poll+0x25/0x1a0
   net_rx_action+0x28e/0x300
   __do_softirq+0xc3/0x276
   ? sort_range+0x20/0x20
   run_ksoftirqd+0x1e/0x30
   smpboot_thread_fn+0xa6/0x130
   kthread+0xcd/0x100
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork+0x31/0x50
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork_asm+0x11/0x20
   &lt;/TASK&gt;

The suggested fix is to introduce a new wrapper (skb_page_unref) that
covers page refcounting for page_pool pages as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26953/">CVE-2024-26953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26953">CVE-2024-26953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223656">SUSE bug 1223656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26955</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: prevent kernel bug at submit_bh_wbc()

Fix a bug where nilfs_get_block() returns a successful status when
searching and inserting the specified block both fail inconsistently.  If
this inconsistent behavior is not due to a previously fixed bug, then an
unexpected race is occurring, so return a temporary error -EAGAIN instead.

This prevents callers such as __block_write_begin_int() from requesting a
read into a buffer that is not mapped, which would cause the BUG_ON check
for the BH_Mapped flag in submit_bh_wbc() to fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223657">SUSE bug 1223657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26956</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix failure to detect DAT corruption in btree and direct mappings

Patch series "nilfs2: fix kernel bug at submit_bh_wbc()".

This resolves a kernel BUG reported by syzbot.  Since there are two
flaws involved, I've made each one a separate patch.

The first patch alone resolves the syzbot-reported bug, but I think
both fixes should be sent to stable, so I've tagged them as such.


This patch (of 2):

Syzbot has reported a kernel bug in submit_bh_wbc() when writing file data
to a nilfs2 file system whose metadata is corrupted.

There are two flaws involved in this issue.

The first flaw is that when nilfs_get_block() locates a data block using
btree or direct mapping, if the disk address translation routine
nilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata
corruption, it can be passed back to nilfs_get_block().  This causes
nilfs_get_block() to misidentify an existing block as non-existent,
causing both data block lookup and insertion to fail inconsistently.

The second flaw is that nilfs_get_block() returns a successful status in
this inconsistent state.  This causes the caller __block_write_begin_int()
or others to request a read even though the buffer is not mapped,
resulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()
failing.

This fixes the first issue by changing the return value to code -EINVAL
when a conversion using DAT fails with code -ENOENT, avoiding the
conflicting condition that leads to the kernel bug described above.  Here,
code -EINVAL indicates that metadata corruption was detected during the
block lookup, which will be properly handled as a file system error and
converted to -EIO when passing through the nilfs2 bmap layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223663">SUSE bug 1223663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26957</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/zcrypt: fix reference counting on zcrypt card objects

Tests with hot-plugging crytpo cards on KVM guests with debug
kernel build revealed an use after free for the load field of
the struct zcrypt_card. The reason was an incorrect reference
handling of the zcrypt card object which could lead to a free
of the zcrypt card object while it was still in use.

This is an example of the slab message:

    kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b
    kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43
    kernel:  kmalloc_trace+0x3f2/0x470
    kernel:  zcrypt_card_alloc+0x36/0x70 [zcrypt]
    kernel:  zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]
    kernel:  ap_device_probe+0x15c/0x290
    kernel:  really_probe+0xd2/0x468
    kernel:  driver_probe_device+0x40/0xf0
    kernel:  __device_attach_driver+0xc0/0x140
    kernel:  bus_for_each_drv+0x8c/0xd0
    kernel:  __device_attach+0x114/0x198
    kernel:  bus_probe_device+0xb4/0xc8
    kernel:  device_add+0x4d2/0x6e0
    kernel:  ap_scan_adapter+0x3d0/0x7c0
    kernel:  ap_scan_bus+0x5a/0x3b0
    kernel:  ap_scan_bus_wq_callback+0x40/0x60
    kernel:  process_one_work+0x26e/0x620
    kernel:  worker_thread+0x21c/0x440
    kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43
    kernel:  kfree+0x37e/0x418
    kernel:  zcrypt_card_put+0x54/0x80 [zcrypt]
    kernel:  ap_device_remove+0x4c/0xe0
    kernel:  device_release_driver_internal+0x1c4/0x270
    kernel:  bus_remove_device+0x100/0x188
    kernel:  device_del+0x164/0x3c0
    kernel:  device_unregister+0x30/0x90
    kernel:  ap_scan_adapter+0xc8/0x7c0
    kernel:  ap_scan_bus+0x5a/0x3b0
    kernel:  ap_scan_bus_wq_callback+0x40/0x60
    kernel:  process_one_work+0x26e/0x620
    kernel:  worker_thread+0x21c/0x440
    kernel:  kthread+0x150/0x168
    kernel:  __ret_from_fork+0x3c/0x58
    kernel:  ret_from_fork+0xa/0x30
    kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)
    kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88
    kernel: Redzone  00000000885a74b0: bb bb bb bb bb bb bb bb                          ........
    kernel: Object   00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5  kkkkkkkkkkhKkkk.
    kernel: Redzone  00000000885a7518: bb bb bb bb bb bb bb bb                          ........
    kernel: Padding  00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a              ZZZZZZZZZZZZ
    kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2
    kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)
    kernel: Call Trace:
    kernel:  [&lt;00000000ca5ab5b8&gt;] dump_stack_lvl+0x90/0x120
    kernel:  [&lt;00000000c99d78bc&gt;] check_bytes_and_report+0x114/0x140
    kernel:  [&lt;00000000c99d53cc&gt;] check_object+0x334/0x3f8
    kernel:  [&lt;00000000c99d820c&gt;] alloc_debug_processing+0xc4/0x1f8
    kernel:  [&lt;00000000c99d852e&gt;] get_partial_node.part.0+0x1ee/0x3e0
    kernel:  [&lt;00000000c99d94ec&gt;] ___slab_alloc+0xaf4/0x13c8
    kernel:  [&lt;00000000c99d9e38&gt;] __slab_alloc.constprop.0+0x78/0xb8
    kernel:  [&lt;00000000c99dc8dc&gt;] __kmalloc+0x434/0x590
    kernel:  [&lt;00000000c9b4c0ce&gt;] ext4_htree_store_dirent+0x4e/0x1c0
    kernel:  [&lt;00000000c9b908a2&gt;] htree_dirblock_to_tree+0x17a/0x3f0
    kernel: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223666">SUSE bug 1223666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26958</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: fix UAF in direct writes

In production we have been hitting the following warning consistently

------------[ cut here ]------------
refcount_t: underflow; use-after-free.
WARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0
Workqueue: nfsiod nfs_direct_write_schedule_work [nfs]
RIP: 0010:refcount_warn_saturate+0x9c/0xe0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x9f/0x130
 ? refcount_warn_saturate+0x9c/0xe0
 ? report_bug+0xcc/0x150
 ? handle_bug+0x3d/0x70
 ? exc_invalid_op+0x16/0x40
 ? asm_exc_invalid_op+0x16/0x20
 ? refcount_warn_saturate+0x9c/0xe0
 nfs_direct_write_schedule_work+0x237/0x250 [nfs]
 process_one_work+0x12f/0x4a0
 worker_thread+0x14e/0x3b0
 ? ZSTD_getCParams_internal+0x220/0x220
 kthread+0xdc/0x120
 ? __btf_name_valid+0xa0/0xa0
 ret_from_fork+0x1f/0x30

This is because we're completing the nfs_direct_request twice in a row.

The source of this is when we have our commit requests to submit, we
process them and send them off, and then in the completion path for the
commit requests we have

if (nfs_commit_end(cinfo.mds))
	nfs_direct_write_complete(dreq);

However since we're submitting asynchronous requests we sometimes have
one that completes before we submit the next one, so we end up calling
complete on the nfs_direct_request twice.

The only other place we use nfs_generic_commit_list() is in
__nfs_commit_inode, which wraps this call in a

nfs_commit_begin();
nfs_commit_end();

Which is a common pattern for this style of completion handling, one
that is also repeated in the direct code with get_dreq()/put_dreq()
calls around where we process events as well as in the completion paths.

Fix this by using the same pattern for the commit requests.

Before with my 200 node rocksdb stress running this warning would pop
every 10ish minutes.  With my patch the stress test has been running for
several hours without popping.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223653">SUSE bug 1223653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26960</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: swap: fix race between free_swap_and_cache() and swapoff()

There was previously a theoretical window where swapoff() could run and
teardown a swap_info_struct while a call to free_swap_and_cache() was
running in another thread.  This could cause, amongst other bad
possibilities, swap_page_trans_huge_swapped() (called by
free_swap_and_cache()) to access the freed memory for swap_map.

This is a theoretical problem and I haven't been able to provoke it from a
test case.  But there has been agreement based on code review that this is
possible (see link below).

Fix it by using get_swap_device()/put_swap_device(), which will stall
swapoff().  There was an extra check in _swap_info_get() to confirm that
the swap entry was not free.  This isn't present in get_swap_device()
because it doesn't make sense in general due to the race between getting
the reference and swapoff.  So I've added an equivalent check directly in
free_swap_and_cache().

Details of how to provoke one possible issue (thanks to David Hildenbrand
for deriving this):

--8&lt;-----

__swap_entry_free() might be the last user and result in
"count == SWAP_HAS_CACHE".

swapoff-&gt;try_to_unuse() will stop as soon as soon as si-&gt;inuse_pages==0.

So the question is: could someone reclaim the folio and turn
si-&gt;inuse_pages==0, before we completed swap_page_trans_huge_swapped().

Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are
still references by swap entries.

Process 1 still references subpage 0 via swap entry.
Process 2 still references subpage 1 via swap entry.

Process 1 quits. Calls free_swap_and_cache().
-&gt; count == SWAP_HAS_CACHE
[then, preempted in the hypervisor etc.]

Process 2 quits. Calls free_swap_and_cache().
-&gt; count == SWAP_HAS_CACHE

Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls
__try_to_reclaim_swap().

__try_to_reclaim_swap()-&gt;folio_free_swap()-&gt;delete_from_swap_cache()-&gt;
put_swap_folio()-&gt;free_swap_slot()-&gt;swapcache_free_entries()-&gt;
swap_entry_free()-&gt;swap_range_free()-&gt;
...
WRITE_ONCE(si-&gt;inuse_pages, si-&gt;inuse_pages - nr_entries);

What stops swapoff to succeed after process 2 reclaimed the swap cache
but before process1 finished its call to swap_page_trans_huge_swapped()?

--8&lt;-----
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223655">SUSE bug 1223655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac802154: fix llsec key resources release in mac802154_llsec_key_del

mac802154_llsec_key_del() can free resources of a key directly without
following the RCU rules for waiting before the end of a grace period. This
may lead to use-after-free in case llsec_lookup_key() is traversing the
list of keys in parallel with a key deletion:

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 4 PID: 16000 at lib/refcount.c:25 refcount_warn_saturate+0x162/0x2a0
Modules linked in:
CPU: 4 PID: 16000 Comm: wpan-ping Not tainted 6.7.0 #19
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0x162/0x2a0
Call Trace:
 &lt;TASK&gt;
 llsec_lookup_key.isra.0+0x890/0x9e0
 mac802154_llsec_encrypt+0x30c/0x9c0
 ieee802154_subif_start_xmit+0x24/0x1e0
 dev_hard_start_xmit+0x13e/0x690
 sch_direct_xmit+0x2ae/0xbc0
 __dev_queue_xmit+0x11dd/0x3c20
 dgram_sendmsg+0x90b/0xd60
 __sys_sendto+0x466/0x4c0
 __x64_sys_sendto+0xe0/0x1c0
 do_syscall_64+0x45/0xf0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76

Also, ieee802154_llsec_key_entry structures are not freed by
mac802154_llsec_key_del():

unreferenced object 0xffff8880613b6980 (size 64):
  comm "iwpan", pid 2176, jiffies 4294761134 (age 60.475s)
  hex dump (first 32 bytes):
    78 0d 8f 18 80 88 ff ff 22 01 00 00 00 00 ad de  x.......".......
    00 00 00 00 00 00 00 00 03 00 cd ab 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff81dcfa62&gt;] __kmem_cache_alloc_node+0x1e2/0x2d0
    [&lt;ffffffff81c43865&gt;] kmalloc_trace+0x25/0xc0
    [&lt;ffffffff88968b09&gt;] mac802154_llsec_key_add+0xac9/0xcf0
    [&lt;ffffffff8896e41a&gt;] ieee802154_add_llsec_key+0x5a/0x80
    [&lt;ffffffff8892adc6&gt;] nl802154_add_llsec_key+0x426/0x5b0
    [&lt;ffffffff86ff293e&gt;] genl_family_rcv_msg_doit+0x1fe/0x2f0
    [&lt;ffffffff86ff46d1&gt;] genl_rcv_msg+0x531/0x7d0
    [&lt;ffffffff86fee7a9&gt;] netlink_rcv_skb+0x169/0x440
    [&lt;ffffffff86ff1d88&gt;] genl_rcv+0x28/0x40
    [&lt;ffffffff86fec15c&gt;] netlink_unicast+0x53c/0x820
    [&lt;ffffffff86fecd8b&gt;] netlink_sendmsg+0x93b/0xe60
    [&lt;ffffffff86b91b35&gt;] ____sys_sendmsg+0xac5/0xca0
    [&lt;ffffffff86b9c3dd&gt;] ___sys_sendmsg+0x11d/0x1c0
    [&lt;ffffffff86b9c65a&gt;] __sys_sendmsg+0xfa/0x1d0
    [&lt;ffffffff88eadbf5&gt;] do_syscall_64+0x45/0xf0
    [&lt;ffffffff890000ea&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

Handle the proper resource release in the RCU callback function
mac802154_llsec_key_del_rcu().

Note that if llsec_lookup_key() finds a key, it gets a refcount via
llsec_key_get() and locally copies key id from key_entry (which is a
list element). So it's safe to call llsec_key_put() and free the list
entry after the RCU grace period elapses.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223652">SUSE bug 1223652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26964</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Add error handling in xhci_map_urb_for_dma

Currently xhci_map_urb_for_dma() creates a temporary buffer and copies
the SG list to the new linear buffer. But if the kzalloc_node() fails,
then the following sg_pcopy_to_buffer() can lead to crash since it
tries to memcpy to NULL pointer.

So return -ENOMEM if kzalloc returns null pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223650">SUSE bug 1223650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223648">SUSE bug 1223648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223646">SUSE bug 1223646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223645">SUSE bug 1223645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26970</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223644">SUSE bug 1223644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26972</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223643">SUSE bug 1223643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26973</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fat: fix uninitialized field in nostale filehandles

When fat_encode_fh_nostale() encodes file handle without a parent it
stores only first 10 bytes of the file handle. However the length of the
file handle must be a multiple of 4 so the file handle is actually 12
bytes long and the last two bytes remain uninitialized. This is not
great at we potentially leak uninitialized information with the handle
to userspace. Properly initialize the full handle length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223641">SUSE bug 1223641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26974</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - resolve race condition during AER recovery

During the PCI AER system's error recovery process, the kernel driver
may encounter a race condition with freeing the reset_data structure's
memory. If the device restart will take more than 10 seconds the function
scheduling that restart will exit due to a timeout, and the reset_data
structure will be freed. However, this data structure is used for
completion notification after the restart is completed, which leads
to a UAF bug.

This results in a KFENCE bug notice.

  BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]
  Use-after-free read at 0x00000000bc56fddf (in kfence-#142):
  adf_device_reset_worker+0x38/0xa0 [intel_qat]
  process_one_work+0x173/0x340

To resolve this race condition, the memory associated to the container
of the work_struct is freed on the worker if the timeout expired,
otherwise on the function that schedules the worker.
The timeout detection can be done by checking if the caller is
still waiting for completion or not by using completion_done() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223638">SUSE bug 1223638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26976</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Always flush async #PF workqueue when vCPU is being destroyed

Always flush the per-vCPU async #PF workqueue when a vCPU is clearing its
completion queue, e.g. when a VM and all its vCPUs is being destroyed.
KVM must ensure that none of its workqueue callbacks is running when the
last reference to the KVM _module_ is put.  Gifting a reference to the
associated VM prevents the workqueue callback from dereferencing freed
vCPU/VM memory, but does not prevent the KVM module from being unloaded
before the callback completes.

Drop the misguided VM refcount gifting, as calling kvm_put_kvm() from
async_pf_execute() if kvm_put_kvm() flushes the async #PF workqueue will
result in deadlock.  async_pf_execute() can't return until kvm_put_kvm()
finishes, and kvm_put_kvm() can't return until async_pf_execute() finishes:

 WARNING: CPU: 8 PID: 251 at virt/kvm/kvm_main.c:1435 kvm_put_kvm+0x2d/0x320 [kvm]
 Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel kvm irqbypass
 CPU: 8 PID: 251 Comm: kworker/8:1 Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 Workqueue: events async_pf_execute [kvm]
 RIP: 0010:kvm_put_kvm+0x2d/0x320 [kvm]
 Call Trace:
  &lt;TASK&gt;
  async_pf_execute+0x198/0x260 [kvm]
  process_one_work+0x145/0x2d0
  worker_thread+0x27e/0x3a0
  kthread+0xba/0xe0
  ret_from_fork+0x2d/0x50
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---
 INFO: task kworker/8:1:251 blocked for more than 120 seconds.
       Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/8:1     state:D stack:0     pid:251   ppid:2      flags:0x00004000
 Workqueue: events async_pf_execute [kvm]
 Call Trace:
  &lt;TASK&gt;
  __schedule+0x33f/0xa40
  schedule+0x53/0xc0
  schedule_timeout+0x12a/0x140
  __wait_for_common+0x8d/0x1d0
  __flush_work.isra.0+0x19f/0x2c0
  kvm_clear_async_pf_completion_queue+0x129/0x190 [kvm]
  kvm_arch_destroy_vm+0x78/0x1b0 [kvm]
  kvm_put_kvm+0x1c1/0x320 [kvm]
  async_pf_execute+0x198/0x260 [kvm]
  process_one_work+0x145/0x2d0
  worker_thread+0x27e/0x3a0
  kthread+0xba/0xe0
  ret_from_fork+0x2d/0x50
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

If kvm_clear_async_pf_completion_queue() actually flushes the workqueue,
then there's no need to gift async_pf_execute() a reference because all
invocations of async_pf_execute() will be forced to complete before the
vCPU and its VM are destroyed/freed.  And that in turn fixes the module
unloading bug as __fput() won't do module_put() on the last vCPU reference
until the vCPU has been freed, e.g. if closing the vCPU file also puts the
last reference to the KVM module.

Note that kvm_check_async_pf_completion() may also take the work item off
the completion queue and so also needs to flush the work queue, as the
work will not be seen by kvm_clear_async_pf_completion_queue().  Waiting
on the workqueue could theoretically delay a vCPU due to waiting for the
work to complete, but that's a very, very small chance, and likely a very
small delay.  kvm_arch_async_page_present_queued() unconditionally makes a
new request, i.e. will effectively delay entering the guest, so the
remaining work is really just:

        trace_kvm_async_pf_completed(addr, cr2_or_gpa);

        __kvm_vcpu_wake_up(vcpu);

        mmput(mm);

and mmput() can't drop the last reference to the page tables if the vCPU is
still alive, i.e. the vCPU won't get stuck tearing down page tables.

Add a helper to do the flushing, specifically to deal with "wakeup all"
work items, as they aren't actually work items, i.e. are never placed in a
workqueue.  Trying to flush a bogus workqueue entry rightly makes
__flush_work() complain (kudos to whoever added that sanity check).

Note, commit 5f6de5cbebee ("KVM: Prevent module exit until al
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26977</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pci_iounmap(): Fix MMIO mapping leak

The #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentally also guards iounmap(),
which means MMIO mappings are leaked.

Move the guard so we call iounmap() for MMIO mappings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223631">SUSE bug 1223631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26979</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26979" ref_url="https://www.suse.com/security/cve/CVE-2024-26979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26979/">CVE-2024-26979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223628">SUSE bug 1223628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix OOB in nilfs_set_de_type

The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is
defined as "S_IFMT &gt;&gt; S_SHIFT", but the nilfs_set_de_type() function,
which uses this array, specifies the index to read from the array in the
same way as "(mode &amp; S_IFMT) &gt;&gt; S_SHIFT".

static void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode
 *inode)
{
	umode_t mode = inode-&gt;i_mode;

	de-&gt;file_type = nilfs_type_by_mode[(mode &amp; S_IFMT)&gt;&gt;S_SHIFT]; // oob
}

However, when the index is determined this way, an out-of-bounds (OOB)
error occurs by referring to an index that is 1 larger than the array size
when the condition "mode &amp; S_IFMT == S_IFMT" is satisfied.  Therefore, a
patch to resize the nilfs_type_by_mode array should be applied to prevent
OOB errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223668">SUSE bug 1223668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero

Syskiller has produced an out of bounds access in fill_meta_index().

That out of bounds access is ultimately caused because the inode
has an inode number with the invalid value of zero, which was not checked.

The reason this causes the out of bounds access is due to following
sequence of events:

1. Fill_meta_index() is called to allocate (via empty_meta_index())
   and fill a metadata index.  It however suffers a data read error
   and aborts, invalidating the newly returned empty metadata index.
   It does this by setting the inode number of the index to zero,
   which means unused (zero is not a valid inode number).

2. When fill_meta_index() is subsequently called again on another
   read operation, locate_meta_index() returns the previous index
   because it matches the inode number of 0.  Because this index
   has been returned it is expected to have been filled, and because
   it hasn't been, an out of bounds access is performed.

This patch adds a sanity check which checks that the inode number
is not zero when the inode is created and returns -EINVAL if it is.

[phillip@squashfs.org.uk: whitespace fix]
  Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223634">SUSE bug 1223634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26984</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau: fix instmem race condition around ptr stores

Running a lot of VK CTS in parallel against nouveau, once every
few hours you might see something like this crash.

BUG: kernel NULL pointer dereference, address: 0000000000000008
PGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27
Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021
RIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]
Code: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee &lt;48&gt; 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1
RSP: 0000:ffffac20c5857838 EFLAGS: 00010202
RAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001
RDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180
RBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10
R10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c
R13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c
FS:  00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:

...

 ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]
 ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]
 nvkm_vmm_iter+0x351/0xa20 [nouveau]
 ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 ? __lock_acquire+0x3ed/0x2170
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]
 ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]

Adding any sort of useful debug usually makes it go away, so I hand
wrote the function in a line, and debugged the asm.

Every so often pt-&gt;memory-&gt;ptrs is NULL. This ptrs ptr is set in
the nv50_instobj_acquire called from nvkm_kmap.

If Thread A and Thread B both get to nv50_instobj_acquire around
the same time, and Thread A hits the refcount_set line, and in
lockstep thread B succeeds at refcount_inc_not_zero, there is a
chance the ptrs value won't have been stored since refcount_set
is unordered. Force a memory barrier here, I picked smp_mb, since
we want it on all CPUs and it's write followed by a read.

v2: use paired smp_rmb/smp_wmb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223633">SUSE bug 1223633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26988</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

init/main.c: Fix potential static_command_line memory overflow

We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for
static_command_line, but the strings copied into static_command_line are
extra_command_line and command_line, rather than extra_command_line and
boot_command_line.

When strlen(command_line) &gt; strlen(boot_command_line), static_command_line
will overflow.

This patch just recovers strlen(command_line) which was miss-consolidated
with strlen(boot_command_line) in the commit f5c7310ac73e ("init/main: add
checks for the return value of memblock_alloc*()")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223747">SUSE bug 1223747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: hibernate: Fix level3 translation fault in swsusp_save()

On arm64 machines, swsusp_save() faults if it attempts to access
MEMBLOCK_NOMAP memory ranges. This can be reproduced in QEMU using UEFI
when booting with rodata=off debug_pagealloc=off and CONFIG_KFENCE=n:

  Unable to handle kernel paging request at virtual address ffffff8000000000
  Mem abort info:
    ESR = 0x0000000096000007
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x07: level 3 translation fault
  Data abort info:
    ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
    CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
  swapper pgtable: 4k pages, 39-bit VAs, pgdp=00000000eeb0b000
  [ffffff8000000000] pgd=180000217fff9803, p4d=180000217fff9803, pud=180000217fff9803, pmd=180000217fff8803, pte=0000000000000000
  Internal error: Oops: 0000000096000007 [#1] SMP
  Internal error: Oops: 0000000096000007 [#1] SMP
  Modules linked in: xt_multiport ipt_REJECT nf_reject_ipv4 xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_filter bpfilter rfkill at803x snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg dwmac_generic stmmac_platform snd_hda_codec stmmac joydev pcs_xpcs snd_hda_core phylink ppdev lp parport ramoops reed_solomon ip_tables x_tables nls_iso8859_1 vfat multipath linear amdgpu amdxcp drm_exec gpu_sched drm_buddy hid_generic usbhid hid radeon video drm_suballoc_helper drm_ttm_helper ttm i2c_algo_bit drm_display_helper cec drm_kms_helper drm
  CPU: 0 PID: 3663 Comm: systemd-sleep Not tainted 6.6.2+ #76
  Source Version: 4e22ed63a0a48e7a7cff9b98b7806d8d4add7dc0
  Hardware name: Greatwall GW-XXXXXX-XXX/GW-XXXXXX-XXX, BIOS KunLun BIOS V4.0 01/19/2021
  pstate: 600003c5 (nZCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : swsusp_save+0x280/0x538
  lr : swsusp_save+0x280/0x538
  sp : ffffffa034a3fa40
  x29: ffffffa034a3fa40 x28: ffffff8000001000 x27: 0000000000000000
  x26: ffffff8001400000 x25: ffffffc08113e248 x24: 0000000000000000
  x23: 0000000000080000 x22: ffffffc08113e280 x21: 00000000000c69f2
  x20: ffffff8000000000 x19: ffffffc081ae2500 x18: 0000000000000000
  x17: 6666662074736420 x16: 3030303030303030 x15: 3038666666666666
  x14: 0000000000000b69 x13: ffffff9f89088530 x12: 00000000ffffffea
  x11: 00000000ffff7fff x10: 00000000ffff7fff x9 : ffffffc08193f0d0
  x8 : 00000000000bffe8 x7 : c0000000ffff7fff x6 : 0000000000000001
  x5 : ffffffa0fff09dc8 x4 : 0000000000000000 x3 : 0000000000000027
  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 000000000000004e
  Call trace:
   swsusp_save+0x280/0x538
   swsusp_arch_suspend+0x148/0x190
   hibernation_snapshot+0x240/0x39c
   hibernate+0xc4/0x378
   state_store+0xf0/0x10c
   kobj_attr_store+0x14/0x24

The reason is swsusp_save() -&gt; copy_data_pages() -&gt; page_is_saveable()
-&gt; kernel_page_present() assuming that a page is always present when
can_set_direct_map() is false (all of rodata_full,
debug_pagealloc_enabled() and arm64_kfence_can_set_direct_map() false),
irrespective of the MEMBLOCK_NOMAP ranges. Such MEMBLOCK_NOMAP regions
should not be saved during hibernation.

This problem was introduced by changes to the pfn_valid() logic in
commit a7d9f306ba70 ("arm64: drop pfn_valid_within() and simplify
pfn_valid()").

Similar to other architectures, drop the !can_set_direct_map() check in
kernel_page_present() so that page_is_savable() skips such pages.

[catalin.marinas@arm.com: rework commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223748">SUSE bug 1223748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26993</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: sysfs: Fix reference leak in sysfs_break_active_protection()

The sysfs_break_active_protection() routine has an obvious reference
leak in its error path.  If the call to kernfs_find_and_get() fails then
kn will be NULL, so the companion sysfs_unbreak_active_protection()
routine won't get called (and would only cause an access violation by
trying to dereference kn-&gt;parent if it was called).  As a result, the
reference to kobj acquired at the start of the function will never be
released.

Fix the leak by adding an explicit kobject_put() call when kn is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223693">SUSE bug 1223693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26994</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

speakup: Avoid crash on very long word

In case a console is set up really large and contains a really long word
(&gt; 256 characters), we have to stop before the length of the word buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223750">SUSE bug 1223750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26996</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error

When ncm function is working and then stop usb0 interface for link down,
eth_stop() is called. At this piont, accidentally if usb transport error
should happen in usb_ep_enable(), 'in_ep' and/or 'out_ep' may not be enabled.

After that, ncm_disable() is called to disable for ncm unbind
but gether_disconnect() is never called since 'in_ep' is not enabled.

As the result, ncm object is released in ncm unbind
but 'dev-&gt;port_usb' associated to 'ncm-&gt;port' is not NULL.

And when ncm bind again to recover netdev, ncm object is reallocated
but usb0 interface is already associated to previous released ncm object.

Therefore, once usb0 interface is up and eth_start_xmit() is called,
released ncm object is dereferrenced and it might cause use-after-free memory.

[function unlink via configfs]
  usb0: eth_stop dev-&gt;port_usb=ffffff9b179c3200
  --&gt; error happens in usb_ep_enable().
  NCM: ncm_disable: ncm=ffffff9b179c3200
  --&gt; no gether_disconnect() since ncm-&gt;port.in_ep-&gt;enabled is false.
  NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200
  NCM: ncm_free: ncm free ncm=ffffff9b179c3200   &lt;-- released ncm

[function link via configfs]
  NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000
  NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000
  NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0
  usb0: eth_open dev-&gt;port_usb=ffffff9b179c3200  &lt;-- previous released ncm
  usb0: eth_start dev-&gt;port_usb=ffffff9b179c3200 &lt;--
  eth_start_xmit()
  --&gt; dev-&gt;wrap()
  Unable to handle kernel paging request at virtual address dead00000000014f

This patch addresses the issue by checking if 'ncm-&gt;netdev' is not NULL at
ncm_disable() to call gether_disconnect() to deassociate 'dev-&gt;port_usb'.
It's more reasonable to check 'ncm-&gt;netdev' to call gether_connect/disconnect
rather than check 'ncm-&gt;port.in_ep-&gt;enabled' since it might not be enabled
but the gether connection might be established.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223752">SUSE bug 1223752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26997</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: host: Fix dereference issue in DDMA completion flow.

Fixed variable dereference issue in DDMA completion flow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223741">SUSE bug 1223741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26999</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial/pmac_zilog: Remove flawed mitigation for rx irq flood

The mitigation was intended to stop the irq completely. That may be
better than a hard lock-up but it turns out that you get a crash anyway
if you're using pmac_zilog as a serial console:

ttyPZ0: pmz: rx irq flood !
BUG: spinlock recursion on CPU#0, swapper/0

That's because the pr_err() call in pmz_receive_chars() results in
pmz_console_write() attempting to lock a spinlock already locked in
pmz_interrupt(). With CONFIG_DEBUG_SPINLOCK=y, this produces a fatal
BUG splat. The spinlock in question is the one in struct uart_port.

Even when it's not fatal, the serial port rx function ceases to work.
Also, the iteration limit doesn't play nicely with QEMU, as can be
seen in the bug report linked below.

A web search for other reports of the error message "pmz: rx irq flood"
didn't produce anything. So I don't think this code is needed any more.
Remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223754">SUSE bug 1223754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: mxs-auart: add spinlock around changing cts state

The uart_handle_cts_change() function in serial_core expects the caller
to hold uport-&gt;lock. For example, I have seen the below kernel splat,
when the Bluetooth driver is loaded on an i.MX28 board.

    [   85.119255] ------------[ cut here ]------------
    [   85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec
    [   85.134694] Modules linked in: hci_uart bluetooth ecdh_generic ecc wlcore_sdio configfs
    [   85.143314] CPU: 0 PID: 27 Comm: kworker/u3:0 Not tainted 6.6.3-00021-gd62a2f068f92 #1
    [   85.151396] Hardware name: Freescale MXS (Device Tree)
    [   85.156679] Workqueue: hci0 hci_power_on [bluetooth]
    (...)
    [   85.191765]  uart_handle_cts_change from mxs_auart_irq_handle+0x380/0x3f4
    [   85.198787]  mxs_auart_irq_handle from __handle_irq_event_percpu+0x88/0x210
    (...)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223757">SUSE bug 1223757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27001</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27001" ref_url="https://www.suse.com/security/cve/CVE-2024-27001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix incomplete endpoint checking

While vmk80xx does have endpoint checking implemented, some things
can fall through the cracks. Depending on the hardware model,
URBs can have either bulk or interrupt type, and current version
of vmk80xx_find_usb_endpoints() function does not take that fully
into account. While this warning does not seem to be too harmful,
at the very least it will crash systems with 'panic_on_warn' set on
them.

Fix the issue found by Syzkaller [1] by somewhat simplifying the
endpoint checking process with usb_find_common_endpoints() and
ensuring that only expected endpoint types are present.

This patch has not been tested on real hardware.

[1] Syzkaller report:
usb 1-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 0 PID: 781 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503
...
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x113/0x520 drivers/usb/core/message.c:59
 vmk80xx_reset_device drivers/comedi/drivers/vmk80xx.c:227 [inline]
 vmk80xx_auto_attach+0xa1c/0x1a40 drivers/comedi/drivers/vmk80xx.c:818
 comedi_auto_config+0x238/0x380 drivers/comedi/drivers.c:1067
 usb_probe_interface+0x5cd/0xb00 drivers/usb/core/driver.c:399
...

Similar issue also found by Syzkaller:
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27001/">CVE-2024-27001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223698">SUSE bug 1223698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: Get runtime PM before walking tree during disable_unused

Doug reported [1] the following hung task:

 INFO: task swapper/0:1 blocked for more than 122 seconds.
       Not tainted 5.15.149-21875-gf795ebc40eb8 #1
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:swapper/0       state:D stack:    0 pid:    1 ppid:     0 flags:0x00000008
 Call trace:
  __switch_to+0xf4/0x1f4
  __schedule+0x418/0xb80
  schedule+0x5c/0x10c
  rpm_resume+0xe0/0x52c
  rpm_resume+0x178/0x52c
  __pm_runtime_resume+0x58/0x98
  clk_pm_runtime_get+0x30/0xb0
  clk_disable_unused_subtree+0x58/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused+0x4c/0xe4
  do_one_initcall+0xcc/0x2d8
  do_initcall_level+0xa4/0x148
  do_initcalls+0x5c/0x9c
  do_basic_setup+0x24/0x30
  kernel_init_freeable+0xec/0x164
  kernel_init+0x28/0x120
  ret_from_fork+0x10/0x20
 INFO: task kworker/u16:0:9 blocked for more than 122 seconds.
       Not tainted 5.15.149-21875-gf795ebc40eb8 #1
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/u16:0   state:D stack:    0 pid:    9 ppid:     2 flags:0x00000008
 Workqueue: events_unbound deferred_probe_work_func
 Call trace:
  __switch_to+0xf4/0x1f4
  __schedule+0x418/0xb80
  schedule+0x5c/0x10c
  schedule_preempt_disabled+0x2c/0x48
  __mutex_lock+0x238/0x488
  __mutex_lock_slowpath+0x1c/0x28
  mutex_lock+0x50/0x74
  clk_prepare_lock+0x7c/0x9c
  clk_core_prepare_lock+0x20/0x44
  clk_prepare+0x24/0x30
  clk_bulk_prepare+0x40/0xb0
  mdss_runtime_resume+0x54/0x1c8
  pm_generic_runtime_resume+0x30/0x44
  __genpd_runtime_resume+0x68/0x7c
  genpd_runtime_resume+0x108/0x1f4
  __rpm_callback+0x84/0x144
  rpm_callback+0x30/0x88
  rpm_resume+0x1f4/0x52c
  rpm_resume+0x178/0x52c
  __pm_runtime_resume+0x58/0x98
  __device_attach+0xe0/0x170
  device_initial_probe+0x1c/0x28
  bus_probe_device+0x3c/0x9c
  device_add+0x644/0x814
  mipi_dsi_device_register_full+0xe4/0x170
  devm_mipi_dsi_device_register_full+0x28/0x70
  ti_sn_bridge_probe+0x1dc/0x2c0
  auxiliary_bus_probe+0x4c/0x94
  really_probe+0xcc/0x2c8
  __driver_probe_device+0xa8/0x130
  driver_probe_device+0x48/0x110
  __device_attach_driver+0xa4/0xcc
  bus_for_each_drv+0x8c/0xd8
  __device_attach+0xf8/0x170
  device_initial_probe+0x1c/0x28
  bus_probe_device+0x3c/0x9c
  deferred_probe_work_func+0x9c/0xd8
  process_one_work+0x148/0x518
  worker_thread+0x138/0x350
  kthread+0x138/0x1e0
  ret_from_fork+0x10/0x20

The first thread is walking the clk tree and calling
clk_pm_runtime_get() to power on devices required to read the clk
hardware via struct clk_ops::is_enabled(). This thread holds the clk
prepare_lock, and is trying to runtime PM resume a device, when it finds
that the device is in the process of resuming so the thread schedule()s
away waiting for the device to finish resuming before continuing. The
second thread is runtime PM resuming the same device, but the runtime
resume callback is calling clk_prepare(), trying to grab the
prepare_lock waiting on the first thread.

This is a classic ABBA deadlock. To properly fix the deadlock, we must
never runtime PM resume or suspend a device with the clk prepare_lock
held. Actually doing that is near impossible today because the global
prepare_lock would have to be dropped in the middle of the tree, the
device runtime PM resumed/suspended, and then the prepare_lock grabbed
again to ensure consistency of the clk tree topology. If anything
changes with the clk tree in the meantime, we've lost and will need to
start the operation all over again.

Luckily, most of the time we're simply incrementing or decrementing the
runtime PM count on an active device, so we don't have the chance to
schedule away with the prepare_lock held. Let's fix this immediate
problem that can be
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223762">SUSE bug 1223762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: nv04: Fix out of bounds access

When Output Resource (dcb-&gt;or) value is assigned in
fabricate_dcb_output(), there may be out of bounds access to
dac_users array in case dcb-&gt;or is zero because ffs(dcb-&gt;or) is
used as index there.
The 'or' argument of fabricate_dcb_output() must be interpreted as a
number of bit to set, not value.

Utilize macros from 'enum nouveau_or' in calls instead of hardcoding.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223802">SUSE bug 1223802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27010</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix mirred deadlock on device recursion

When the mirred action is used on a classful egress qdisc and a packet is
mirrored or redirected to self we hit a qdisc lock deadlock.
See trace below.

[..... other info removed for brevity....]
[   82.890906]
[   82.890906] ============================================
[   82.890906] WARNING: possible recursive locking detected
[   82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G        W
[   82.890906] --------------------------------------------
[   82.890906] ping/418 is trying to acquire lock:
[   82.890906] ffff888006994110 (&amp;sch-&gt;q.lock){+.-.}-{3:3}, at:
__dev_queue_xmit+0x1778/0x3550
[   82.890906]
[   82.890906] but task is already holding lock:
[   82.890906] ffff888006994110 (&amp;sch-&gt;q.lock){+.-.}-{3:3}, at:
__dev_queue_xmit+0x1778/0x3550
[   82.890906]
[   82.890906] other info that might help us debug this:
[   82.890906]  Possible unsafe locking scenario:
[   82.890906]
[   82.890906]        CPU0
[   82.890906]        ----
[   82.890906]   lock(&amp;sch-&gt;q.lock);
[   82.890906]   lock(&amp;sch-&gt;q.lock);
[   82.890906]
[   82.890906]  *** DEADLOCK ***
[   82.890906]
[..... other info removed for brevity....]

Example setup (eth0-&gt;eth0) to recreate
tc qdisc add dev eth0 root handle 1: htb default 30
tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \
     action mirred egress redirect dev eth0

Another example(eth0-&gt;eth1-&gt;eth0) to recreate
tc qdisc add dev eth0 root handle 1: htb default 30
tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \
     action mirred egress redirect dev eth1

tc qdisc add dev eth1 root handle 1: htb default 30
tc filter add dev eth1 handle 1: protocol ip prio 2 matchall \
     action mirred egress redirect dev eth0

We fix this by adding an owner field (CPU id) to struct Qdisc set after
root qdisc is entered. When the softirq enters it a second time, if the
qdisc owner is the same CPU, the packet is dropped to break the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223720">SUSE bug 1223720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27011</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix memleak in map from abort path

The delete set command does not rely on the transaction object for
element removal, therefore, a combination of delete element + delete set
from the abort path could result in restoring twice the refcount of the
mapping.

Check for inactive element in the next generation for the delete element
command in the abort path, skip restoring state if next generation bit
has been already cleared. This is similar to the activate logic using
the set walk iterator.

[ 6170.286929] ------------[ cut here ]------------
[ 6170.286939] WARNING: CPU: 6 PID: 790302 at net/netfilter/nf_tables_api.c:2086 nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.287071] Modules linked in: [...]
[ 6170.287633] CPU: 6 PID: 790302 Comm: kworker/6:2 Not tainted 6.9.0-rc3+ #365
[ 6170.287768] RIP: 0010:nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.287886] Code: df 48 8d 7d 58 e8 69 2e 3b df 48 8b 7d 58 e8 80 1b 37 df 48 8d 7d 68 e8 57 2e 3b df 48 8b 7d 68 e8 6e 1b 37 df 48 89 ef eb c4 &lt;0f&gt; 0b 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 0f
[ 6170.287895] RSP: 0018:ffff888134b8fd08 EFLAGS: 00010202
[ 6170.287904] RAX: 0000000000000001 RBX: ffff888125bffb28 RCX: dffffc0000000000
[ 6170.287912] RDX: 0000000000000003 RSI: ffffffffa20298ab RDI: ffff88811ebe4750
[ 6170.287919] RBP: ffff88811ebe4700 R08: ffff88838e812650 R09: fffffbfff0623a55
[ 6170.287926] R10: ffffffff8311d2af R11: 0000000000000001 R12: ffff888125bffb10
[ 6170.287933] R13: ffff888125bffb10 R14: dead000000000122 R15: dead000000000100
[ 6170.287940] FS:  0000000000000000(0000) GS:ffff888390b00000(0000) knlGS:0000000000000000
[ 6170.287948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 6170.287955] CR2: 00007fd31fc00710 CR3: 0000000133f60004 CR4: 00000000001706f0
[ 6170.287962] Call Trace:
[ 6170.287967]  &lt;TASK&gt;
[ 6170.287973]  ? __warn+0x9f/0x1a0
[ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.288092]  ? report_bug+0x1b1/0x1e0
[ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.288092]  ? report_bug+0x1b1/0x1e0
[ 6170.288104]  ? handle_bug+0x3c/0x70
[ 6170.288112]  ? exc_invalid_op+0x17/0x40
[ 6170.288120]  ? asm_exc_invalid_op+0x1a/0x20
[ 6170.288132]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]
[ 6170.288243]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.288366]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]
[ 6170.288483]  nf_tables_trans_destroy_work+0x588/0x590 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223803">SUSE bug 1223803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27013</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: limit printing rate when illegal packet received by tun dev

vhost_worker will call tun call backs to receive packets. If too many
illegal packets arrives, tun_do_read will keep dumping packet contents.
When console is enabled, it will costs much more cpu time to dump
packet and soft lockup will be detected.

net_ratelimit mechanism can be used to limit the dumping rate.

PID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: "vhost-32980"
 #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253
 #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3
 #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e
 #3 [fffffe00003fced0] do_nmi at ffffffff8922660d
 #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663
    [exception RIP: io_serial_in+20]
    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002
    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000
    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0
    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f
    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020
    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 #5 [ffffa655314979e8] io_serial_in at ffffffff89792594
 #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470
 #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6
 #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605
 #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558
 #10 [ffffa65531497ac8] console_unlock at ffffffff89316124
 #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07
 #12 [ffffa65531497b68] printk at ffffffff89318306
 #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765
 #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]
 #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]
 #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]
 #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]
 #18 [ffffa65531497f10] kthread at ffffffff892d2e72
 #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223745">SUSE bug 1223745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27014</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Prevent deadlock while disabling aRFS

When disabling aRFS under the `priv-&gt;state_lock`, any scheduled
aRFS works are canceled using the `cancel_work_sync` function,
which waits for the work to end if it has already started.
However, while waiting for the work handler, the handler will
try to acquire the `state_lock` which is already acquired.

The worker acquires the lock to delete the rules if the state
is down, which is not the worker's responsibility since
disabling aRFS deletes the rules.

Add an aRFS state variable, which indicates whether the aRFS is
enabled and prevent adding rules when the aRFS is disabled.

Kernel log:

======================================================
WARNING: possible circular locking dependency detected
6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I
------------------------------------------------------
ethtool/386089 is trying to acquire lock:
ffff88810f21ce68 ((work_completion)(&amp;rule-&gt;arfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0

but task is already holding lock:
ffff8884a1808cc0 (&amp;priv-&gt;state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (&amp;priv-&gt;state_lock){+.+.}-{3:3}:
       __mutex_lock+0x80/0xc90
       arfs_handle_work+0x4b/0x3b0 [mlx5_core]
       process_one_work+0x1dc/0x4a0
       worker_thread+0x1bf/0x3c0
       kthread+0xd7/0x100
       ret_from_fork+0x2d/0x50
       ret_from_fork_asm+0x11/0x20

-&gt; #0 ((work_completion)(&amp;rule-&gt;arfs_work)){+.+.}-{0:0}:
       __lock_acquire+0x17b4/0x2c80
       lock_acquire+0xd0/0x2b0
       __flush_work+0x7a/0x4e0
       __cancel_work_timer+0x131/0x1c0
       arfs_del_rules+0x143/0x1e0 [mlx5_core]
       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]
       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]
       ethnl_set_channels+0x28f/0x3b0
       ethnl_default_set_doit+0xec/0x240
       genl_family_rcv_msg_doit+0xd0/0x120
       genl_rcv_msg+0x188/0x2c0
       netlink_rcv_skb+0x54/0x100
       genl_rcv+0x24/0x40
       netlink_unicast+0x1a1/0x270
       netlink_sendmsg+0x214/0x460
       __sock_sendmsg+0x38/0x60
       __sys_sendto+0x113/0x170
       __x64_sys_sendto+0x20/0x30
       do_syscall_64+0x40/0xe0
       entry_SYSCALL_64_after_hwframe+0x46/0x4e

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;priv-&gt;state_lock);
                               lock((work_completion)(&amp;rule-&gt;arfs_work));
                               lock(&amp;priv-&gt;state_lock);
  lock((work_completion)(&amp;rule-&gt;arfs_work));

 *** DEADLOCK ***

3 locks held by ethtool/386089:
 #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40
 #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240
 #2: ffff8884a1808cc0 (&amp;priv-&gt;state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]

stack backtrace:
CPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x60/0xa0
 check_noncircular+0x144/0x160
 __lock_acquire+0x17b4/0x2c80
 lock_acquire+0xd0/0x2b0
 ? __flush_work+0x74/0x4e0
 ? save_trace+0x3e/0x360
 ? __flush_work+0x74/0x4e0
 __flush_work+0x7a/0x4e0
 ? __flush_work+0x74/0x4e0
 ? __lock_acquire+0xa78/0x2c80
 ? lock_acquire+0xd0/0x2b0
 ? mark_held_locks+0x49/0x70
 __cancel_work_timer+0x131/0x1c0
 ? mark_held_locks+0x49/0x70
 arfs_del_rules+0x143/0x1e0 [mlx5_core]
 mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]
 mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]
 ethnl_set_channels+0x28f/0x3b0
 ethnl_default_set_doit+0xec/0x240
 genl_family_rcv_msg_doit+0xd0/0x120
 genl_rcv_msg+0x188/0x2c0
 ? ethn
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223735">SUSE bug 1223735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27015</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: incorrect pppoe tuple

pppoe traffic reaching ingress path does not match the flowtable entry
because the pppoe header is expected to be at the network header offset.
This bug causes a mismatch in the flow table lookup, so pppoe packets
enter the classical forwarding path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223806">SUSE bug 1223806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: validate pppoe header

Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223807">SUSE bug 1223807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27019</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()

nft_unregister_obj() can concurrent with __nft_obj_type_get(),
and there is not any protection when iterate over nf_tables_objects
list in __nft_obj_type_get(). Therefore, there is potential data-race
of nf_tables_objects list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_objects
list in __nft_obj_type_get(), and use rcu_read_lock() in the caller
nft_obj_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223813">SUSE bug 1223813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27020</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()

nft_unregister_expr() can concurrent with __nft_expr_type_get(),
and there is not any protection when iterate over nf_tables_expressions
list in __nft_expr_type_get(). Therefore, there is potential data-race
of nf_tables_expressions list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_expressions
list in __nft_expr_type_get(), and use rcu_read_lock() in the caller
nft_expr_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223815">SUSE bug 1223815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27024</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/rds: fix WARNING in rds_conn_connect_if_down

If connection isn't established yet, get_mr() will fail, trigger connection after
get_mr().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223777">SUSE bug 1223777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27025</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: null check for nla_nest_start

nla_nest_start() may fail and return NULL. Insert a check and set errno
based on other call sites within the same source code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223778">SUSE bug 1223778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27028</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-mt65xx: Fix NULL pointer access in interrupt handler

The TX buffer in spi_transfer can be a NULL pointer, so the interrupt
handler may end up writing to the invalid memory and cause crashes.

Add a check to trans-&gt;tx_buf before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223788">SUSE bug 1223788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27030</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Use separate handlers for interrupts

For PF to AF interrupt vector and VF to AF vector same
interrupt handler is registered which is causing race condition.
When two interrupts are raised to two CPUs at same time
then two cores serve same event corrupting the data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223790">SUSE bug 1223790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27037</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: zynq: Prevent null pointer dereference caused by kmalloc failure

The kmalloc() in zynq_clk_setup() will return null if the
physical memory has run out. As a result, if we use snprintf()
to write data to the null address, the null pointer dereference
bug will happen.

This patch uses a stack variable to replace the kmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223717">SUSE bug 1223717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27038</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: Fix clk_core_get NULL dereference

It is possible for clk_core_get to dereference a NULL in the following
sequence:

clk_core_get()
    of_clk_get_hw_from_clkspec()
        __of_clk_get_hw_from_provider()
            __clk_get_hw()

__clk_get_hw() can return NULL which is dereferenced by clk_core_get() at
hw-&gt;core.

Prior to commit dde4eff47c82 ("clk: Look for parents with clkdev based
clk_lookups") the check IS_ERR_OR_NULL() was performed which would have
caught the NULL.

Reading the description of this function it talks about returning NULL but
that cannot be so at the moment.

Update the function to check for hw before dereferencing it and return NULL
if hw is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223816">SUSE bug 1223816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()

'p_clk' is an array allocated just before the for loop for all clk that
need to be registered.
It is incremented at each loop iteration.

If a clk_register() call fails, 'p_clk' may point to something different
from what should be freed.

The best we can do, is to avoid this wrong release of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223821">SUSE bug 1223821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27041</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini()

Since 'adev-&gt;dm.dc' in amdgpu_dm_fini() might turn out to be NULL
before the call to dc_enable_dmub_notifications(), check
beforehand to ensure there will not be a possible NULL-ptr-deref
there.

Also, since commit 1e88eb1b2c25 ("drm/amd/display: Drop
CONFIG_DRM_AMD_DC_HDCP") there are two separate checks for NULL in
'adev-&gt;dm.dc' before dc_deinit_callbacks() and dc_dmub_srv_destroy().
Clean up by combining them all under one 'if'.

Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223714">SUSE bug 1223714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27042</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27042" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'

The issue arises when the array 'adev-&gt;vcn.vcn_config' is accessed
before checking if the index 'adev-&gt;vcn.num_vcn_inst' is within the
bounds of the array.

The fix involves moving the bounds check before the array access. This
ensures that 'adev-&gt;vcn.num_vcn_inst' is within the bounds of the array
before it is used as an index.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev-&gt;vcn.num_vcn_inst' after use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223823">SUSE bug 1223823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27043</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: edia: dvbdev: fix a use-after-free

In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:

budget_register
  |-&gt; dvb_dmxdev_init
        |-&gt; dvb_register_device
  |-&gt; dvb_dmxdev_release
        |-&gt; dvb_unregister_device
              |-&gt; dvb_remove_device
                    |-&gt; dvb_device_put
                          |-&gt; kref_put

When calling dvb_unregister_device, dmxdev-&gt;dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223825">SUSE bug 1223825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27045</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'

Tell snprintf() to store at most 10 bytes in the output buffer
instead of 30.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223826">SUSE bug 1223826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27046</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: handle acti_netdevs allocation failure

The kmalloc_array() in nfp_fl_lag_do_work() will return null, if
the physical memory has run out. As a result, if we dereference
the acti_netdevs, the null pointer dereference bugs will happen.

This patch adds a check to judge whether allocation failure occurs.
If it happens, the delayed work will be rescheduled and try again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223827">SUSE bug 1223827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27047</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: fix phy_get_internal_delay accessing an empty array

The phy_get_internal_delay function could try to access to an empty
array in the case that the driver is calling phy_get_internal_delay
without defining delay_values and rx-internal-delay-ps or
tx-internal-delay-ps is defined to 0 in the device-tree.
This will lead to "unable to handle kernel NULL pointer dereference at
virtual address 0". To avoid this kernel oops, the test should be delay
&gt;= 0. As there is already delay &lt; 0 test just before, the test could
only be size == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223828">SUSE bug 1223828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27051</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return 0 in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223769">SUSE bug 1223769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27052</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work

The workqueue might still be running, when the driver is stopped. To
avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223829">SUSE bug 1223829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27053</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix RCU usage in connect path

With lockdep enabled, calls to the connect function from cfg802.11 layer
lead to the following warning:

=============================
WARNING: suspicious RCU usage
6.7.0-rc1-wt+ #333 Not tainted
-----------------------------
drivers/net/wireless/microchip/wilc1000/hif.c:386
suspicious rcu_dereference_check() usage!
[...]
stack backtrace:
CPU: 0 PID: 100 Comm: wpa_supplicant Not tainted 6.7.0-rc1-wt+ #333
Hardware name: Atmel SAMA5
 unwind_backtrace from show_stack+0x18/0x1c
 show_stack from dump_stack_lvl+0x34/0x48
 dump_stack_lvl from wilc_parse_join_bss_param+0x7dc/0x7f4
 wilc_parse_join_bss_param from connect+0x2c4/0x648
 connect from cfg80211_connect+0x30c/0xb74
 cfg80211_connect from nl80211_connect+0x860/0xa94
 nl80211_connect from genl_rcv_msg+0x3fc/0x59c
 genl_rcv_msg from netlink_rcv_skb+0xd0/0x1f8
 netlink_rcv_skb from genl_rcv+0x2c/0x3c
 genl_rcv from netlink_unicast+0x3b0/0x550
 netlink_unicast from netlink_sendmsg+0x368/0x688
 netlink_sendmsg from ____sys_sendmsg+0x190/0x430
 ____sys_sendmsg from ___sys_sendmsg+0x110/0x158
 ___sys_sendmsg from sys_sendmsg+0xe8/0x150
 sys_sendmsg from ret_fast_syscall+0x0/0x1c

This warning is emitted because in the connect path, when trying to parse
target BSS parameters, we dereference a RCU pointer whithout being in RCU
critical section.
Fix RCU dereference usage by moving it to a RCU read critical section. To
avoid wrapping the whole wilc_parse_join_bss_param under the critical
section, just use the critical section to copy ies data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223737">SUSE bug 1223737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27054</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix double module refcount decrement

Once the discipline is associated with the device, deleting the device
takes care of decrementing the module's refcount.  Doing it manually on
this error path causes refcount to artificially decrease on each error
while it should just stay the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223819">SUSE bug 1223819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27056</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: ensure offloading TID queue exists

The resume code path assumes that the TX queue for the offloading TID
has been configured. At resume time it then tries to sync the write
pointer as it may have been updated by the firmware.

In the unusual event that no packets have been send on TID 0, the queue
will not have been allocated and this causes a crash. Fix this by
ensuring the queue exist at suspend time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223822">SUSE bug 1223822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27059</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command

The isd200 sub-driver in usb-storage uses the HEADS and SECTORS values
in the ATA ID information to calculate cylinder and head values when
creating a CDB for READ or WRITE commands.  The calculation involves
division and modulus operations, which will cause a crash if either of
these values is 0.  While this never happens with a genuine device, it
could happen with a flawed or subversive emulation, as reported by the
syzbot fuzzer.

Protect against this possibility by refusing to bind to the device if
either the ATA_ID_HEADS or ATA_ID_SECTORS value in the device's ID
information is 0.  This requires isd200_Initialization() to return a
negative error code when initialization fails; currently it always
returns 0 (even when there is an error).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223738">SUSE bug 1223738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27062</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau: lock the client object tree.

It appears the client object tree has no locking unless I've missed
something else. Fix races around adding/removing client objects,
mostly vram bar mappings.

 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI
[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27
[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021
[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]
[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 &lt;48&gt; 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe
[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206
[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58
[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400
[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000
[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0
[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007
[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000
[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0
[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4562.099544] Call Trace:
[ 4562.099555]  &lt;TASK&gt;
[ 4562.099573]  ? die_addr+0x36/0x90
[ 4562.099583]  ? exc_general_protection+0x246/0x4a0
[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30
[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]
[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]
[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]
[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]
[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0
[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]
[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270
[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]
[ 4562.100356]  __do_fault+0x32/0x150
[ 4562.100362]  do_fault+0x7c/0x560
[ 4562.100369]  __handle_mm_fault+0x800/0xc10
[ 4562.100382]  handle_mm_fault+0x17c/0x3e0
[ 4562.100388]  do_user_addr_fault+0x208/0x860
[ 4562.100395]  exc_page_fault+0x7f/0x200
[ 4562.100402]  asm_exc_page_fault+0x26/0x30
[ 4562.100412] RIP: 0033:0x9b9870
[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 &lt;44&gt; 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7
[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246
[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000
[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066
[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000
[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff
[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 4562.100446]  &lt;/TASK&gt;
[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223834">SUSE bug 1223834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27065</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not compare internal table flags on updates

Restore skipping transaction if table update does not modify flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223836">SUSE bug 1223836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27072</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usbtv: Remove useless locks in usbtv_video_free()

Remove locks calls in usbtv_video_free() because
are useless and may led to a deadlock as reported here:
https://syzkaller.appspot.com/x/bisect.txt?x=166dc872180000
Also remove usbtv_stop() call since it will be called when
unregistering the device.

Before 'c838530d230b' this issue would only be noticed if you
disconnect while streaming and now it is noticeable even when
disconnecting while not streaming.


[hverkuil: fix minor spelling mistake in log message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223837">SUSE bug 1223837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27073</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ttpci: fix two memleaks in budget_av_attach

When saa7146_register_device and saa7146_vv_init fails, budget_av_attach
should free the resources it allocates, like the error-handling of
ttpci_budget_init does. Besides, there are two fixme comment refers to
such deallocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223843">SUSE bug 1223843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27074</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: go7007: fix a memleak in go7007_load_encoder

In go7007_load_encoder, bounce(i.e. go-&gt;boot_fw), is allocated without
a deallocation thereafter. After the following call chain:

saa7134_go7007_init
  |-&gt; go7007_boot_encoder
        |-&gt; go7007_load_encoder
  |-&gt; kfree(go)

go is freed and thus bounce is leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223844">SUSE bug 1223844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27075</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: avoid stack overflow warnings with clang

A previous patch worked around a KASAN issue in stv0367, now a similar
problem showed up with clang:

drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than]
 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe)

Rework the stv0367_writereg() function to be simpler and mark both
register access functions as noinline_for_stack so the temporary
i2c_msg structures do not get duplicated on the stack when KASAN_STACK
is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223842">SUSE bug 1223842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27076</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak

Free the memory allocated in v4l2_ctrl_handler_init on release.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223779">SUSE bug 1223779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27077</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity

The entity-&gt;name (i.e. name) is allocated in v4l2_m2m_register_entity
but isn't freed in its following error-handling paths. This patch
adds such deallocation to prevent memleak of entity-&gt;name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223780">SUSE bug 1223780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-tpg: fix some memleaks in tpg_alloc

In tpg_alloc, resources should be deallocated in each and every
error-handling paths, since they are allocated in for statements.
Otherwise there would be memleaks because tpg_free is called only when
tpg_alloc return 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223781">SUSE bug 1223781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix NULL domain on device release

In the kdump kernel, the IOMMU operates in deferred_attach mode. In this
mode, info-&gt;domain may not yet be assigned by the time the release_device
function is called. It leads to the following crash in the crash kernel:

    BUG: kernel NULL pointer dereference, address: 000000000000003c
    ...
    RIP: 0010:do_raw_spin_lock+0xa/0xa0
    ...
    _raw_spin_lock_irqsave+0x1b/0x30
    intel_iommu_release_device+0x96/0x170
    iommu_deinit_device+0x39/0xf0
    __iommu_group_remove_device+0xa0/0xd0
    iommu_bus_notifier+0x55/0xb0
    notifier_call_chain+0x5a/0xd0
    blocking_notifier_call_chain+0x41/0x60
    bus_notify+0x34/0x50
    device_del+0x269/0x3d0
    pci_remove_bus_device+0x77/0x100
    p2sb_bar+0xae/0x1d0
    ...
    i801_probe+0x423/0x740

Use the release_domain mechanism to fix it. The scalable mode context
entry which is not part of release domain should be cleared in
release_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223742">SUSE bug 1223742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27388</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: fix some memleaks in gssx_dec_option_array

The creds and oa-&gt;data need to be freed in the error-handling paths after
their allocation. So this patch add these deallocations in the
corresponding paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223744">SUSE bug 1223744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27389</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore: inode: Only d_invalidate() is needed

Unloading a modular pstore backend with records in pstorefs would
trigger the dput() double-drop warning:

  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410

Using the combo of d_drop()/dput() (as mentioned in
Documentation/filesystems/vfs.rst) isn't the right approach here, and
leads to the reference counting problem seen above. Use d_invalidate()
and update the code to not bother checking for error codes that can
never happen.

---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861403" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861404" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27393</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Add missing skb_mark_for_recycle

Notice that skb_mark_for_recycle() is introduced later than fixes tag in
commit 6a5bcd84e886 ("page_pool: Allow drivers to hint on SKB recycling").

It is believed that fixes tag were missing a call to page_pool_release_page()
between v5.9 to v5.14, after which is should have used skb_mark_for_recycle().
Since v6.6 the call page_pool_release_page() were removed (in
commit 535b9c61bdef ("net: page_pool: hide page_pool_release_page()")
and remaining callers converted (in commit 6bfef2ec0172 ("Merge branch
'net-page_pool-remove-page_pool_release_page'")).

This leak became visible in v6.8 via commit dba1b8a7ab68 ("mm/page_pool: catch
page_pool memory leaks").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224076">SUSE bug 1224076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27395</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27395" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: Fix Use-After-Free in ovs_ct_exit

Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal
of ovs_ct_limit_exit, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.

To prevent this, it should be changed to hlist_for_each_entry_safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224098">SUSE bug 1224098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27396</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gtp: Fix Use-After-Free in gtp_dellink

Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal
of gtp_dellink, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.

To prevent this, it should be changed to hlist_for_each_entry_safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224096">SUSE bug 1224096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27398</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout

When the sco connection is established and then, the sco socket
is releasing, timeout_work will be scheduled to judge whether
the sco disconnection is timeout. The sock will be deallocated
later, but it is dereferenced again in sco_sock_timeout. As a
result, the use-after-free bugs will happen. The root cause is
shown below:

    Cleanup Thread               |      Worker Thread
sco_sock_release                 |
  sco_sock_close                 |
    __sco_sock_close             |
      sco_sock_set_timer         |
        schedule_delayed_work    |
  sco_sock_kill                  |    (wait a time)
    sock_put(sk) //FREE          |  sco_sock_timeout
                                 |    sock_hold(sk) //USE

The KASAN report triggered by POC is shown below:

[   95.890016] ==================================================================
[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0
[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7
...
[   95.890755] Workqueue: events sco_sock_timeout
[   95.890755] Call Trace:
[   95.890755]  &lt;TASK&gt;
[   95.890755]  dump_stack_lvl+0x45/0x110
[   95.890755]  print_address_description+0x78/0x390
[   95.890755]  print_report+0x11b/0x250
[   95.890755]  ? __virt_addr_valid+0xbe/0xf0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_report+0x139/0x170
[   95.890755]  ? update_load_avg+0xe5/0x9f0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_check_range+0x2c3/0x2e0
[   95.890755]  sco_sock_timeout+0x5e/0x1c0
[   95.890755]  process_one_work+0x561/0xc50
[   95.890755]  worker_thread+0xab2/0x13c0
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  kthread+0x279/0x300
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork+0x34/0x60
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork_asm+0x11/0x20
[   95.890755]  &lt;/TASK&gt;
[   95.890755]
[   95.890755] Allocated by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  __kasan_kmalloc+0x86/0x90
[   95.890755]  __kmalloc+0x17f/0x360
[   95.890755]  sk_prot_alloc+0xe1/0x1a0
[   95.890755]  sk_alloc+0x31/0x4e0
[   95.890755]  bt_sock_alloc+0x2b/0x2a0
[   95.890755]  sco_sock_create+0xad/0x320
[   95.890755]  bt_sock_create+0x145/0x320
[   95.890755]  __sock_create+0x2e1/0x650
[   95.890755]  __sys_socket+0xd0/0x280
[   95.890755]  __x64_sys_socket+0x75/0x80
[   95.890755]  do_syscall_64+0xc4/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] Freed by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  kasan_save_free_info+0x40/0x50
[   95.890755]  poison_slab_object+0x118/0x180
[   95.890755]  __kasan_slab_free+0x12/0x30
[   95.890755]  kfree+0xb2/0x240
[   95.890755]  __sk_destruct+0x317/0x410
[   95.890755]  sco_sock_release+0x232/0x280
[   95.890755]  sock_close+0xb2/0x210
[   95.890755]  __fput+0x37f/0x770
[   95.890755]  task_work_run+0x1ae/0x210
[   95.890755]  get_signal+0xe17/0xf70
[   95.890755]  arch_do_signal_or_restart+0x3f/0x520
[   95.890755]  syscall_exit_to_user_mode+0x55/0x120
[   95.890755]  do_syscall_64+0xd1/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] The buggy address belongs to the object at ffff88800c388000
[   95.890755]  which belongs to the cache kmalloc-1k of size 1024
[   95.890755] The buggy address is located 128 bytes inside of
[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)
[   95.890755]
[   95.890755] The buggy address belongs to the physical page:
[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388
[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   95.890755] ano
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225013">SUSE bug 1225013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27399</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout

There is a race condition between l2cap_chan_timeout() and
l2cap_chan_del(). When we use l2cap_chan_del() to delete the
channel, the chan-&gt;conn will be set to null. But the conn could
be dereferenced again in the mutex_lock() of l2cap_chan_timeout().
As a result the null pointer dereference bug will happen. The
KASAN report triggered by POC is shown below:

[  472.074580] ==================================================================
[  472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0
[  472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7
[  472.075308]
[  472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36
[  472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4
[  472.075308] Workqueue: events l2cap_chan_timeout
[  472.075308] Call Trace:
[  472.075308]  &lt;TASK&gt;
[  472.075308]  dump_stack_lvl+0x137/0x1a0
[  472.075308]  print_report+0x101/0x250
[  472.075308]  ? __virt_addr_valid+0x77/0x160
[  472.075308]  ? mutex_lock+0x68/0xc0
[  472.075308]  kasan_report+0x139/0x170
[  472.075308]  ? mutex_lock+0x68/0xc0
[  472.075308]  kasan_check_range+0x2c3/0x2e0
[  472.075308]  mutex_lock+0x68/0xc0
[  472.075308]  l2cap_chan_timeout+0x181/0x300
[  472.075308]  process_one_work+0x5d2/0xe00
[  472.075308]  worker_thread+0xe1d/0x1660
[  472.075308]  ? pr_cont_work+0x5e0/0x5e0
[  472.075308]  kthread+0x2b7/0x350
[  472.075308]  ? pr_cont_work+0x5e0/0x5e0
[  472.075308]  ? kthread_blkcg+0xd0/0xd0
[  472.075308]  ret_from_fork+0x4d/0x80
[  472.075308]  ? kthread_blkcg+0xd0/0xd0
[  472.075308]  ret_from_fork_asm+0x11/0x20
[  472.075308]  &lt;/TASK&gt;
[  472.075308] ==================================================================
[  472.094860] Disabling lock debugging due to kernel taint
[  472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158
[  472.096136] #PF: supervisor write access in kernel mode
[  472.096136] #PF: error_code(0x0002) - not-present page
[  472.096136] PGD 0 P4D 0
[  472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI
[  472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G    B              6.9.0-rc5-00356-g78c0094a146b #36
[  472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4
[  472.096136] Workqueue: events l2cap_chan_timeout
[  472.096136] RIP: 0010:mutex_lock+0x88/0xc0
[  472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88
[  472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246
[  472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865
[  472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78
[  472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f
[  472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000
[  472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00
[  472.096136] FS:  0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000
[  472.096136] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0
[  472.096136] Call Trace:
[  472.096136]  &lt;TASK&gt;
[  472.096136]  ? __die_body+0x8d/0xe0
[  472.096136]  ? page_fault_oops+0x6b8/0x9a0
[  472.096136]  ? kernelmode_fixup_or_oops+0x20c/0x2a0
[  472.096136]  ? do_user_addr_fault+0x1027/0x1340
[  472.096136]  ? _printk+0x7a/0xa0
[  472.096136]  ? mutex_lock+0x68/0xc0
[  472.096136]  ? add_taint+0x42/0xd0
[  472.096136]  ? exc_page_fault+0x6a/0x1b0
[  472.096136]  ? asm_exc_page_fault+0x26/0x30
[  472.096136]  ? mutex_lock+0x75/0xc0
[  472.096136]  ? mutex_lock+0x88/0xc0
[  472.096136]  ? mutex_lock+0x75/0xc0
[  472.096136]  l2cap_chan_timeo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224177">SUSE bug 1224177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27400</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27400" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2

This reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move
on same heap. The basic problem here is that after the move the old
location is simply not available any more.

Some fixes were suggested, but essentially we should call the move
notification before actually moving things because only this way we have
the correct order for DMA-buf and VM move notifications as well.

Also rework the statistic handling so that we don't update the eviction
counter before the move.

v2: add missing NULL check
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224180">SUSE bug 1224180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27401</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27401" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27401" ref_url="https://www.suse.com/security/cve/CVE-2024-27401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firewire: nosy: ensure user_length is taken into account when fetching packet contents

Ensure that packet_buffer_get respects the user_length provided. If
the length of the head packet exceeds the user_length, packet_buffer_get
will now return 0 to signify to the user that no data were read
and a larger buffer size is required. Helps prevent user space overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27401/">CVE-2024-27401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27401">CVE-2024-27401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224181">SUSE bug 1224181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27402</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phonet/pep: fix racy skb_queue_empty() use

The receive queues are protected by their respective spin-lock, not
the socket lock. This could lead to skb_peek() unexpectedly
returning NULL or a pointer to an already dequeued socket buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224414">SUSE bug 1224414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27403</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_flow_offload: reset dst in route object after setting up flow

dst is transferred to the flow object, route object does not own it
anymore.  Reset dst in route object, otherwise if flow_offload_add()
fails, error path releases dst twice, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224415">SUSE bug 1224415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27405</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs

It is observed sometimes when tethering is used over NCM with Windows 11
as host, at some instances, the gadget_giveback has one byte appended at
the end of a proper NTB. When the NTB is parsed, unwrap call looks for
any leftover bytes in SKB provided by u_ether and if there are any pending
bytes, it treats them as a separate NTB and parses it. But in case the
second NTB (as per unwrap call) is faulty/corrupt, all the datagrams that
were parsed properly in the first NTB and saved in rx_list are dropped.

Adding a few custom traces showed the following:
[002] d..1  7828.532866: dwc3_gadget_giveback: ep1out:
req 000000003868811a length 1025/16384 zsI ==&gt; 0
[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb toprocess: 1025
[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342
[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67
[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400
[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10
[002] d..1  7828.532869: ncm_unwrap_ntb: K: Parsed NTB with 1 frames

In this case, the giveback is of 1025 bytes and block length is 1024.
The rest 1 byte (which is 0x00) won't be parsed resulting in drop of
all datagrams in rx_list.

Same is case with packets of size 2048:
[002] d..1  7828.557948: dwc3_gadget_giveback: ep1out:
req 0000000011dfd96e length 2049/16384 zsI ==&gt; 0
[002] d..1  7828.557949: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342
[002] d..1  7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800

Lecroy shows one byte coming in extra confirming that the byte is coming
in from PC:

 Transfer 2959 - Bytes Transferred(1025)  Timestamp((18.524 843 590)
 - Transaction 8391 - Data(1025 bytes) Timestamp(18.524 843 590)
 --- Packet 4063861
       Data(1024 bytes)
       Duration(2.117us) Idle(14.700ns) Timestamp(18.524 843 590)
 --- Packet 4063863
       Data(1 byte)
       Duration(66.160ns) Time(282.000ns) Timestamp(18.524 845 722)

According to Windows driver, no ZLP is needed if wBlockLength is non-zero,
because the non-zero wBlockLength has already told the function side the
size of transfer to be expected. However, there are in-market NCM devices
that rely on ZLP as long as the wBlockLength is multiple of wMaxPacketSize.
To deal with such devices, it pads an extra 0 at end so the transfer is no
longer multiple of wMaxPacketSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224423">SUSE bug 1224423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27410</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: reject iftype change with mesh ID change

It's currently possible to change the mesh ID when the
interface isn't yet in mesh mode, at the same time as
changing it into mesh mode. This leads to an overwrite
of data in the wdev-&gt;u union for the interface type it
currently has, causing cfg80211_change_iface() to do
wrong things when switching.

We could probably allow setting an interface to mesh
while setting the mesh ID at the same time by doing a
different order of operations here, but realistically
there's no userspace that's going to do this, so just
disallow changes in iftype when setting mesh ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224432">SUSE bug 1224432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27412</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27412" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: bq27xxx-i2c: Do not free non existing IRQ

The bq27xxx i2c-client may not have an IRQ, in which case
client-&gt;irq will be 0. bq27xxx_battery_i2c_probe() already has
an if (client-&gt;irq) check wrapping the request_threaded_irq().

But bq27xxx_battery_i2c_remove() unconditionally calls
free_irq(client-&gt;irq) leading to:

[  190.310742] ------------[ cut here ]------------
[  190.310843] Trying to free already-free IRQ 0
[  190.310861] WARNING: CPU: 2 PID: 1304 at kernel/irq/manage.c:1893 free_irq+0x1b8/0x310

Followed by a backtrace when unbinding the driver. Add
an if (client-&gt;irq) to bq27xxx_battery_i2c_remove() mirroring
probe() to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224437">SUSE bug 1224437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27413</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/capsule-loader: fix incorrect allocation size

gcc-14 notices that the allocation with sizeof(void) on 32-bit architectures
is not enough for a 64-bit phys_addr_t:

drivers/firmware/efi/capsule-loader.c: In function 'efi_capsule_open':
drivers/firmware/efi/capsule-loader.c:295:24: error: allocation of insufficient size '4' for type 'phys_addr_t' {aka 'long long unsigned int'} with size '8' [-Werror=alloc-size]
  295 |         cap_info-&gt;phys = kzalloc(sizeof(void *), GFP_KERNEL);
      |                        ^

Use the correct type instead here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225315">SUSE bug 1225315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27416</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST

If we received HCI_EV_IO_CAPA_REQUEST while
HCI_OP_READ_REMOTE_EXT_FEATURES is yet to be responded assume the remote
does support SSP since otherwise this event shouldn't be generated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224723">SUSE bug 1224723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27417</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()

It seems that if userspace provides a correct IFA_TARGET_NETNSID value
but no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()
returns -EINVAL with an elevated "struct net" refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224721">SUSE bug 1224721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27419</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27419" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27419" ref_url="https://www.suse.com/security/cve/CVE-2024-27419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netrom: Fix data-races around sysctl_net_busy_read

We need to protect the reader reading the sysctl value because the
value can be changed concurrently.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27419/">CVE-2024-27419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27419">CVE-2024-27419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224759">SUSE bug 1224759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27431</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpumap: Zero-initialise xdp_rxq_info struct before running XDP program

When running an XDP program that is attached to a cpumap entry, we don't
initialise the xdp_rxq_info data structure being used in the xdp_buff
that backs the XDP program invocation. Tobias noticed that this leads to
random values being returned as the xdp_md-&gt;rx_queue_index value for XDP
programs running in a cpumap.

This means we're basically returning the contents of the uninitialised
memory, which is bad. Fix this by zero-initialising the rxq data
structure before running the XDP program.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224718">SUSE bug 1224718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27432</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix PPE hanging issue

A patch to resolve an issue was found in MediaTek's GPL-licensed SDK:
In the mtk_ppe_stop() function, the PPE scan mode is not disabled before
disabling the PPE. This can potentially lead to a hang during the process
of disabling the PPE.

Without this patch, the PPE may experience a hang during the reboot test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224716">SUSE bug 1224716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27435</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27435" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix reconnection fail due to reserved tag allocation

We found a issue on production environment while using NVMe over RDMA,
admin_q reconnect failed forever while remote target and network is ok.
After dig into it, we found it may caused by a ABBA deadlock due to tag
allocation. In my case, the tag was hold by a keep alive request
waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the
request maked as idle and will not process before reset success. As
fabric_q shares tagset with admin_q, while reconnect remote target, we
need a tag for connect command, but the only one reserved tag was held
by keep alive command which waiting inside admin_q. As a result, we
failed to reconnect admin_q forever. In order to fix this issue, I
think we should keep two reserved tags for admin queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224717">SUSE bug 1224717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27436</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Stop parsing channels bits when all channels are found.

If a usb audio device sets more bits than the amount of channels
it could write outside of the map array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224803">SUSE bug 1224803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27437</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Disable auto-enable of exclusive INTx IRQ

Currently for devices requiring masking at the irqchip for INTx, ie.
devices without DisINTx support, the IRQ is enabled in request_irq()
and subsequently disabled as necessary to align with the masked status
flag.  This presents a window where the interrupt could fire between
these events, resulting in the IRQ incrementing the disable depth twice.
This would be unrecoverable for a user since the masked flag prevents
nested enables through vfio.

Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx
is never auto-enabled, then unmask as required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222625">SUSE bug 1222625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1170-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1172-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14523-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXHQWREVRCMINNOILT7P3YW7GOCJDXWZ/" source="SUSE-SU"/>
    <description>
    wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-11-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221831">SUSE bug 1221831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853991" comment="libblkid1-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151787" comment="libblkid1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853992" comment="libfdisk1-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154114" comment="libfdisk1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853993" comment="libmount1-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151789" comment="libmount1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853994" comment="libsmartcols1-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151791" comment="libsmartcols1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853995" comment="libuuid1-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151793" comment="libuuid1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853996" comment="util-linux-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151795" comment="util-linux is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853997" comment="util-linux-systemd-2.37.4-150500.9.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151797" comment="util-linux-systemd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020088.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3WPJO3GKMRSPM2EPUNFU5AXM6YFRQAN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2025-01-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234984">SUSE bug 1234984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865581" comment="skopeo-1.14.4-150300.11.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265412" comment="skopeo is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28182</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1167-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1167-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019073.html" source="SUSE-SU"/>
    <description>
    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221399">SUSE bug 1221399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853565" comment="libnghttp2-14-1.40.0-150200.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28757</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036541.html" source="SUSE-SU"/>
    <description>
    libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221289">SUSE bug 1221289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009853566" comment="libexpat1-2.4.4-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018994.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221746">SUSE bug 1221746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854661" comment="gnutls-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854662" comment="libgnutls30-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854663" comment="libgnutls30-hmac-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018994.html" source="SUSE-SU"/>
    <description>
    A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221747">SUSE bug 1221747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854661" comment="gnutls-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854662" comment="libgnutls30-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854663" comment="libgnutls30-hmac-3.7.3-150400.4.44.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281488" comment="libgnutls30-hmac is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29038</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9424" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019074.html" source="SUSE-SU"/>
    <description>
    tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223687">SUSE bug 1223687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861081" comment="tpm2.0-tools-5.2-150400.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615872" comment="tpm2.0-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9424" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019074.html" source="SUSE-SU"/>
    <description>
    tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file.  As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223689">SUSE bug 1223689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861081" comment="tpm2.0-tools-5.2-150400.6.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009615872" comment="tpm2.0-tools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29040</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29040" ref_url="https://www.suse.com/security/cve/CVE-2024-29040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1635-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019072.html" source="SUSE-SU"/>
    <description>
    This repository hosts source code implementing the Trusted Computing Group's (TCG) TPM2 Software Stack (TSS). The JSON Quote Info returned by Fapi_Quote has to be deserialized by Fapi_VerifyQuote to the TPM Structure `TPMS_ATTEST`. For the field `TPM2_GENERATED magic` of this structure any number can be used in the JSON structure. The verifier can receive a state which does not represent the actual, possibly malicious state of the device under test. The malicious device might get access to data it shouldn't, or can use services it shouldn't be able to. This 
issue has been patched in version 4.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29040/">CVE-2024-29040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223690">SUSE bug 1223690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861073" comment="libtss2-esys0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695701" comment="libtss2-esys0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861074" comment="libtss2-fapi1-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742552" comment="libtss2-fapi1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861075" comment="libtss2-mu0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695702" comment="libtss2-mu0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861076" comment="libtss2-rc0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698084" comment="libtss2-rc0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861077" comment="libtss2-sys1-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698085" comment="libtss2-sys1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861078" comment="libtss2-tcti-device0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742559" comment="libtss2-tcti-device0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861079" comment="libtss2-tctildr0-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742566" comment="libtss2-tctildr0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009861080" comment="tpm2-0-tss-3.1.0-150400.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742568" comment="tpm2-0-tss is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223019">SUSE bug 1223019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855836" comment="glibc-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855837" comment="glibc-devel-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855838" comment="glibc-locale-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009855839" comment="glibc-locale-base-2.31-150300.74.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31076</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline

The absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of
interrupt affinity reconfiguration via procfs. Instead, the change is
deferred until the next instance of the interrupt being triggered on the
original CPU.

When the interrupt next triggers on the original CPU, the new affinity is
enforced within __irq_move_irq(). A vector is allocated from the new CPU,
but the old vector on the original CPU remains and is not immediately
reclaimed. Instead, apicd-&gt;move_in_progress is flagged, and the reclaiming
process is delayed until the next trigger of the interrupt on the new CPU.

Upon the subsequent triggering of the interrupt on the new CPU,
irq_complete_move() adds a task to the old CPU's vector_cleanup list if it
remains online. Subsequently, the timer on the old CPU iterates over its
vector_cleanup list, reclaiming old vectors.

However, a rare scenario arises if the old CPU is outgoing before the
interrupt triggers again on the new CPU.

In that case irq_force_complete_move() is not invoked on the outgoing CPU
to reclaim the old apicd-&gt;prev_vector because the interrupt isn't currently
affine to the outgoing CPU, and irq_needs_fixup() returns false. Even
though __vector_schedule_cleanup() is later called on the new CPU, it
doesn't reclaim apicd-&gt;prev_vector; instead, it simply resets both
apicd-&gt;move_in_progress and apicd-&gt;prev_vector to 0.

As a result, the vector remains unreclaimed in vector_matrix, leading to a
CPU vector leak.

To address this issue, move the invocation of irq_force_complete_move()
before the irq_needs_fixup() call to reclaim apicd-&gt;prev_vector, if the
interrupt is currently or used to be affine to the outgoing CPU.

Additionally, reclaim the vector in __vector_schedule_cleanup() as well,
following a warning message, although theoretically it should never see
apicd-&gt;move_in_progress with apicd-&gt;prev_cpu pointing to an offline CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226765">SUSE bug 1226765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31142</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31142" ref_url="https://www.suse.com/security/cve/CVE-2024-31142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
    <description>
    Because of a logical error in XSA-407 (Branch Type Confusion), the
mitigation is not applied properly when it is intended to be used.
XSA-434 (Speculative Return Stack Overflow) uses the same
infrastructure, so is equally impacted.

For more details, see:
  https://xenbits.xen.org/xsa/advisory-407.html
  https://xenbits.xen.org/xsa/advisory-434.html

    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31142/">CVE-2024-31142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31142">CVE-2024-31142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222302">SUSE bug 1222302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009854754" comment="xen-libs-4.17.4_02-150500.3.30.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31143</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31143" ref_url="https://www.suse.com/security/cve/CVE-2024-31143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
    <description>
    An optional feature of PCI MSI called "Multiple Message" allows a
device to use multiple consecutive interrupt vectors.  Unlike for MSI-X,
the setting up of these consecutive vectors needs to happen all in one
go.  In this handling an error path could be taken in different
situations, with or without a particular lock held.  This error path
wrongly releases the lock even when it is not currently held.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-10-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31143/">CVE-2024-31143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31143">CVE-2024-31143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227355">SUSE bug 1227355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202431145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31145</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31145" ref_url="https://www.suse.com/security/cve/CVE-2024-31145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2994-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3001-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019585.html" source="SUSE-SU"/>
    <description>
    Certain PCI devices in a system might be assigned Reserved Memory
Regions (specified via Reserved Memory Region Reporting, "RMRR") for
Intel VT-d or Unity Mapping ranges for AMD-Vi.  These are typically used
for platform tasks such as legacy USB emulation.

Since the precise purpose of these regions is unknown, once a device
associated with such a region is active, the mappings of these regions
need to remain continuouly accessible by the device.  In the logic
establishing these mappings, error handling was flawed, resulting in
such mappings to potentially remain in place when they should have been
removed again.  Respective guests would then gain access to memory
regions which they aren't supposed to have access to.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31145/">CVE-2024-31145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31145">CVE-2024-31145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228574">SUSE bug 1228574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202431146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31146</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31146" ref_url="https://www.suse.com/security/cve/CVE-2024-31146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2994-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3001-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019585.html" source="SUSE-SU"/>
    <description>
    When multiple devices share resources and one of them is to be passed
through to a guest, security of the entire system and of respective
guests individually cannot really be guaranteed without knowing
internals of any of the involved guests.  Therefore such a configuration
cannot really be security-supported, yet making that explicit was so far
missing.

Resources the sharing of which is known to be problematic include, but
are not limited to
- - PCI Base Address Registers (BARs) of multiple devices mapping to the
  same page (4k on x86),
- - INTx lines.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31146/">CVE-2024-31146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31146">CVE-2024-31146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228575">SUSE bug 1228575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202432002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32002</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224168">SUSE bug 1224168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862483" comment="git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862484" comment="git-core-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862485" comment="perl-Git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627143" comment="perl-Git is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862483" comment="git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862484" comment="git-core-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862485" comment="perl-Git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627143" comment="perl-Git is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32020</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224171">SUSE bug 1224171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862483" comment="git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862484" comment="git-core-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862485" comment="perl-Git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627143" comment="perl-Git is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32021</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning
will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224172">SUSE bug 1224172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862483" comment="git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862484" comment="git-core-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862485" comment="perl-Git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627143" comment="perl-Git is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32465</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repository, but vulnerabilities allow those protections to be bypassed. In the context of cloning local repositories owned by other users, this vulnerability has been covered in CVE-2024-32004. But there are circumstances where the fixes for CVE-2024-32004 are not enough: For example, when obtaining a `.zip` file containing a full copy of a Git repository, it should not be trusted by default to be safe, as e.g. hooks could be configured to run within the context of that repository. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid using Git in repositories that have been obtained via archives from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224173">SUSE bug 1224173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862483" comment="git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151600" comment="git is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862484" comment="git-core-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151601" comment="git-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009862485" comment="perl-Git-2.35.3-150300.10.39.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009627143" comment="perl-Git is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32487</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035617.html" source="SUSE-SU"/>
    <description>
    less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-11"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009860372" comment="less-590-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177208" comment="less is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33394</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33394" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33394" ref_url="https://www.suse.com/security/cve/CVE-2024-33394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035833.html" source="SUSE-SU"/>
    <description>
    An issue in kubevirt kubevirt v1.2.0 and before allows a local attacker to execute arbitrary code via a crafted command to get the token component.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33394/">CVE-2024-33394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33394">CVE-2024-33394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223965">SUSE bug 1223965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009870180" comment="kubevirt-manifests-1.1.1-150500.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009870189" comment="kubevirt-virtctl-1.1.1-150500.8.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow.  This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223530">SUSE bug 1223530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: Null pointer crashes after notfound response

If the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference.  This flaw was introduced in glibc 2.15 when the
cache was added to nscd.

This vulnerability is only present in the nscd binary.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223589">SUSE bug 1223589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache may terminate daemon on memory allocation failure

The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients.  The
flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223426">SUSE bug 1223426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache assumes NSS callback uses in-buffer strings

The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864024" comment="glibc-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864025" comment="glibc-devel-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864026" comment="glibc-locale-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009864027" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33619</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: libstub: only free priv.runtime_map when allocated

priv.runtime_map is only allocated when efi_novamap is not set.
Otherwise, it is an uninitialized value.  In the error path, it is freed
unconditionally.  Avoid passing an uninitialized value to free_pool.
Free priv.runtime_map only when it was allocated.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226768">SUSE bug 1226768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34064</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035494.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `&gt;`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863244" comment="python3-Jinja2-2.10.1-150000.3.13.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253389" comment="python3-Jinja2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34397</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1830-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019344.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941063" comment="glib2-tools-2.70.5-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941064" comment="libgio-2_0-0-2.70.5-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941065" comment="libglib-2_0-0-2.70.5-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941066" comment="libgmodule-2_0-0-2.70.5-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941067" comment="libgobject-2_0-0-2.70.5-150400.3.14.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34459</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34459" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34459" ref_url="https://www.suse.com/security/cve/CVE-2024-34459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035812.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-34459/">CVE-2024-34459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224281">SUSE bug 1224281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009871391" comment="libxml2-2-2.10.3-150500.5.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009871392" comment="libxml2-tools-2.10.3-150500.5.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009871393" comment="python3-libxml2-2.10.3-150500.5.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698019" comment="python3-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3446</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3446" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222843">SUSE bug 1222843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857841" comment="qemu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857819" comment="qemu-accel-tcg-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857820" comment="qemu-arm-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857842" comment="qemu-audio-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857843" comment="qemu-block-curl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857844" comment="qemu-chardev-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857845" comment="qemu-guest-agent-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857846" comment="qemu-hw-display-qxl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857847" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857848" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857849" comment="qemu-hw-usb-redirect-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857772" comment="qemu-ipxe-1.0.0+-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857832" comment="qemu-s390x-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857780" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857781" comment="qemu-sgabios-8-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857850" comment="qemu-tools-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857851" comment="qemu-ui-opengl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857852" comment="qemu-ui-spice-core-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857790" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857837" comment="qemu-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3447</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3447" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3447" ref_url="https://www.suse.com/security/cve/CVE-2024-3447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019428.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s-&gt;data_count` and the size of  `s-&gt;fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3447/">CVE-2024-3447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3447">CVE-2024-3447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222845">SUSE bug 1222845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857841" comment="qemu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857819" comment="qemu-accel-tcg-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857820" comment="qemu-arm-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857842" comment="qemu-audio-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857843" comment="qemu-block-curl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857844" comment="qemu-chardev-spice-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857845" comment="qemu-guest-agent-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857846" comment="qemu-hw-display-qxl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857847" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857848" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857849" comment="qemu-hw-usb-redirect-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857772" comment="qemu-ipxe-1.0.0+-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857832" comment="qemu-s390x-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857780" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857781" comment="qemu-sgabios-8-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857850" comment="qemu-tools-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857851" comment="qemu-ui-opengl-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857852" comment="qemu-ui-spice-core-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857790" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857837" comment="qemu-x86-7.1.0-150500.49.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0012" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1880-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1937-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018806.html" source="SUSE-SU"/>
    <description>
    Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863423" comment="python3-requests-2.25.1-150300.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152097" comment="python3-requests is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35235</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2003-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035961.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225365">SUSE bug 1225365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865705" comment="cups-config-2.2.7-150000.3.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865706" comment="libcups2-2.2.7-150000.3.59.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35247</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: region: add owner module and take its refcount

The current implementation of the fpga region assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the region
during programming if the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_region
struct and use it to take the module's refcount. Modify the functions for
registering a region to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the region as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a region without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226948">SUSE bug 1226948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35789</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes

When moving a station out of a VLAN and deleting the VLAN afterwards, the
fast_rx entry still holds a pointer to the VLAN's netdev, which can cause
use-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx
after the VLAN change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227320">SUSE bug 1227320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35790</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35790" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group

The DisplayPort driver's sysfs nodes may be present to the userspace before
typec_altmode_set_drvdata() completes in dp_altmode_probe. This means that
a sysfs read can trigger a NULL pointer error by deferencing dp-&gt;hpd in
hpd_show or dp-&gt;lock in pin_assignment_show, as dev_get_drvdata() returns
NULL in those cases.

Remove manual sysfs node creation in favor of adding attribute group as
default for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is
not used here otherwise the path to the sysfs nodes is no longer compliant
with the ABI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224712">SUSE bug 1224712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35791</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region()

Do the cache flush of converted pages in svm_register_enc_region() before
dropping kvm-&gt;lock to fix use-after-free issues where region and/or its
array of pages could be freed by a different task, e.g. if userspace has
__unregister_enc_region_locked() already queued up for the region.

Note, the "obvious" alternative of using local variables doesn't fully
resolve the bug, as region-&gt;pages is also dynamically allocated.  I.e. the
region structure itself would be fine, but region-&gt;pages could be freed.

Flushing multiple pages under kvm-&gt;lock is unfortunate, but the entire
flow is a rare slow path, and the manual flush is only needed on CPUs that
lack coherency for encrypted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224725">SUSE bug 1224725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35796</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35796" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ll_temac: platform_get_resource replaced by wrong function

The function platform_get_resource was replaced with
devm_platform_ioremap_resource_byname and is called using 0 as name.

This eventually ends up in platform_get_resource_byname in the call
stack, where it causes a null pointer in strcmp.

	if (type == resource_type(r) &amp;&amp; !strcmp(r-&gt;name, name))

It should have been replaced with devm_platform_ioremap_resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224615">SUSE bug 1224615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35799</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35799" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Prevent crash when disable stream

[Why]
Disabling stream encoder invokes a function that no longer exists.

[How]
Check if the function declaration is NULL in disable stream encoder.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224740">SUSE bug 1224740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35801</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD

Commit 672365477ae8 ("x86/fpu: Update XFD state where required") and
commit 8bf26758ca96 ("x86/fpu: Add XFD state to fpstate") introduced a
per CPU variable xfd_state to keep the MSR_IA32_XFD value cached, in
order to avoid unnecessary writes to the MSR.

On CPU hotplug MSR_IA32_XFD is reset to the init_fpstate.xfd, which
wipes out any stale state. But the per CPU cached xfd value is not
reset, which brings them out of sync.

As a consequence a subsequent xfd_update_state() might fail to update
the MSR which in turn can result in XRSTOR raising a #NM in kernel
space, which crashes the kernel.

To fix this, introduce xfd_set_state() to write xfd_state together
with MSR_IA32_XFD, and use it in all places that set MSR_IA32_XFD.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224732">SUSE bug 1224732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Mark target gfn of emulated atomic instruction as dirty

When emulating an atomic access on behalf of the guest, mark the target
gfn dirty if the CMPXCHG by KVM is attempted and doesn't fault.  This
fixes a bug where KVM effectively corrupts guest memory during live
migration by writing to guest memory without informing userspace that the
page is dirty.

Marking the page dirty got unintentionally dropped when KVM's emulated
CMPXCHG was converted to do a user access.  Before that, KVM explicitly
mapped the guest page into kernel memory, and marked the page dirty during
the unmap phase.

Mark the page dirty even if the CMPXCHG fails, as the old data is written
back on failure, i.e. the page is still written.  The value written is
guaranteed to be the same because the operation is atomic, but KVM's ABI
is that all writes are dirty logged regardless of the value written.  And
more importantly, that's what KVM did before the buggy commit.

Huge kudos to the folks on the Cc list (and many others), who did all the
actual work of triaging and debugging.

base-commit: 6769ea8da8a93ed4630f1ce64df6aafcaabfce64
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224638">SUSE bug 1224638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35805</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm snapshot: fix lockup in dm_exception_table_exit

There was reported lockup when we exit a snapshot with many exceptions.
Fix this by adding "cond_resched" to the loop that frees the exceptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224743">SUSE bug 1224743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35806</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Always disable interrupts when taking cgr_lock

smp_call_function_single disables IRQs when executing the callback. To
prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.
This is already done by qman_update_cgr and qman_delete_cgr; fix the
other lockers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224699">SUSE bug 1224699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35807</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix corruption during on-line resize

We observed a corruption during on-line resize of a file system that is
larger than 16 TiB with 4k block size. With having more then 2^32 blocks
resize_inode is turned off by default by mke2fs. The issue can be
reproduced on a smaller file system for convenience by explicitly
turning off resize_inode. An on-line resize across an 8 GiB boundary (the
size of a meta block group in this setup) then leads to a corruption:

  dev=/dev/&lt;some_dev&gt; # should be &gt;= 16 GiB
  mkdir -p /corruption
  /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))
  mount -t ext4 $dev /corruption

  dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))
  sha1sum /corruption/test
  # 79d2658b39dcfd77274e435b0934028adafaab11  /corruption/test

  /sbin/resize2fs $dev $((2*2**21))
  # drop page cache to force reload the block from disk
  echo 1 &gt; /proc/sys/vm/drop_caches

  sha1sum /corruption/test
  # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3  /corruption/test

2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per
block group and 2^6 are the number of block groups that make a meta
block group.

The last checksum might be different depending on how the file is laid
out across the physical blocks. The actual corruption occurs at physical
block 63*2^15 = 2064384 which would be the location of the backup of the
meta block group's block descriptor. During the on-line resize the file
system will be converted to meta_bg starting at s_first_meta_bg which is
2 in the example - meaning all block groups after 16 GiB. However, in
ext4_flex_group_add we might add block groups that are not part of the
first meta block group yet. In the reproducer we achieved this by
substracting the size of a whole block group from the point where the
meta block group would start. This must be considered when updating the
backup block group descriptors to follow the non-meta_bg layout. The fix
is to add a test whether the group to add is already part of the meta
block group or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224735">SUSE bug 1224735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35809</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/PM: Drain runtime-idle callbacks before driver removal

A race condition between the .runtime_idle() callback and the .remove()
callback in the rtsx_pcr PCI driver leads to a kernel crash due to an
unhandled page fault [1].

The problem is that rtsx_pci_runtime_idle() is not expected to be running
after pm_runtime_get_sync() has been called, but the latter doesn't really
guarantee that.  It only guarantees that the suspend and resume callbacks
will not be running when it returns.

However, if a .runtime_idle() callback is already running when
pm_runtime_get_sync() is called, the latter will notice that the runtime PM
status of the device is RPM_ACTIVE and it will return right away without
waiting for the former to complete.  In fact, it cannot wait for
.runtime_idle() to complete because it may be called from that callback (it
arguably does not make much sense to do that, but it is not strictly
prohibited).

Thus in general, whoever is providing a .runtime_idle() callback needs
to protect it from running in parallel with whatever code runs after
pm_runtime_get_sync().  [Note that .runtime_idle() will not start after
pm_runtime_get_sync() has returned, but it may continue running then if it
has started earlier.]

One way to address that race condition is to call pm_runtime_barrier()
after pm_runtime_get_sync() (not before it, because a nonzero value of the
runtime PM usage counter is necessary to prevent runtime PM callbacks from
being invoked) to wait for the .runtime_idle() callback to complete should
it be running at that point.  A suitable place for doing that is in
pci_device_remove() which calls pm_runtime_get_sync() before removing the
driver, so it may as well call pm_runtime_barrier() subsequently, which
will prevent the race in question from occurring, not just in the rtsx_pcr
driver, but in any PCI drivers providing .runtime_idle() callbacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224738">SUSE bug 1224738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35811</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35811" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

This is the candidate patch of CVE-2023-47233 :
https://nvd.nist.gov/vuln/detail/CVE-2023-47233

In brcm80211 driver,it starts with the following invoking chain
to start init a timeout worker:

-&gt;brcmf_usb_probe
  -&gt;brcmf_usb_probe_cb
    -&gt;brcmf_attach
      -&gt;brcmf_bus_started
        -&gt;brcmf_cfg80211_attach
          -&gt;wl_init_priv
            -&gt;brcmf_init_escan
              -&gt;INIT_WORK(&amp;cfg-&gt;escan_timeout_work,
		  brcmf_cfg80211_escan_timeout_worker);

If we disconnect the USB by hotplug, it will call
brcmf_usb_disconnect to make cleanup. The invoking chain is :

brcmf_usb_disconnect
  -&gt;brcmf_usb_disconnect_cb
    -&gt;brcmf_detach
      -&gt;brcmf_cfg80211_detach
        -&gt;kfree(cfg);

While the timeout woker may still be running. This will cause
a use-after-free bug on cfg in brcmf_cfg80211_escan_timeout_worker.

Fix it by deleting the timer and canceling the worker in
brcmf_cfg80211_detach.

[arend.vanspriel@broadcom.com: keep timer delete as is and cancel work just before free]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35812</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35812" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35812" ref_url="https://www.suse.com/security/cve/CVE-2024-35812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35812/">CVE-2024-35812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224624">SUSE bug 1224624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35813" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: core: Avoid negative index with array access

Commit 4d0c8d0aef63 ("mmc: core: Use mrq.sbc in close-ended ffu") assigns
prev_idata = idatas[i - 1], but doesn't check that the iterator i is
greater than zero. Let's fix this by adding a check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224618">SUSE bug 1224618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

swiotlb: Fix double-allocation of slots due to broken alignment handling

Commit bbb73a103fbb ("swiotlb: fix a braino in the alignment check fix"),
which was a fix for commit 0eee5ae10256 ("swiotlb: fix slot alignment
checks"), causes a functional regression with vsock in a virtual machine
using bouncing via a restricted DMA SWIOTLB pool.

When virtio allocates the virtqueues for the vsock device using
dma_alloc_coherent(), the SWIOTLB search can return page-unaligned
allocations if 'area-&gt;index' was left unaligned by a previous allocation
from the buffer:

 # Final address in brackets is the SWIOTLB address returned to the caller
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1645-1649/7168 (0x98326800)
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1649-1653/7168 (0x98328800)
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1653-1657/7168 (0x9832a800)

This ends badly (typically buffer corruption and/or a hang) because
swiotlb_alloc() is expecting a page-aligned allocation and so blindly
returns a pointer to the 'struct page' corresponding to the allocation,
therefore double-allocating the first half (2KiB slot) of the 4KiB page.

Fix the problem by treating the allocation alignment separately to any
additional alignment requirements from the device, using the maximum
of the two as the stride to search the buffer slots and taking care
to ensure a minimum of page-alignment for buffers larger than a page.

This also resolves swiotlb allocation failures occuring due to the
inclusion of ~PAGE_MASK in 'iotlb_align_mask' for large allocations and
resulting in alignment requirements exceeding swiotlb_max_mapping_size().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224602">SUSE bug 1224602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35815</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion

The first kiocb_set_cancel_fn() argument may point at a struct kiocb
that is not embedded inside struct aio_kiocb. With the current code,
depending on the compiler, the req-&gt;ki_ctx read happens either before
the IOCB_AIO_RW test or after that test. Move the req-&gt;ki_ctx read such
that it is guaranteed that the IOCB_AIO_RW test happens first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag

Otherwise after the GTT bo is released, the GTT and gart space is freed
but amdgpu_ttm_backend_unbind will not clear the gart page table entry
and leave valid mapping entry pointing to the stale system page. Then
if GPU access the gart address mistakely, it will read undefined value
instead page fault, harder to debug and reproduce the real issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225313">SUSE bug 1225313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Use raw spinlock for cgr_lock

smp_call_function always runs its callback in hard IRQ context, even on
PREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock
for cgr_lock to ensure we aren't waiting on a sleeping task.

Although this bug has existed for a while, it was not apparent until
commit ef2a8d5478b9 ("net: dpaa: Adjust queue depth on rate change")
which invokes smp_call_function_single via qman_update_cgr_safe every
time a link goes up or down.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224683">SUSE bug 1224683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubifs: Set page uptodate in the correct place

Page cache reads are lockless, so setting the freshly allocated page
uptodate before we've overwritten it with the data it's supposed to have
in it will allow a simultaneous reader to see old data.  Move the call
to SetPageUptodate into ubifs_write_end(), which is after we copied the
new data into the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224629">SUSE bug 1224629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35822</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: udc: remove warning when queue disabled ep

It is possible trigger below warning message from mass storage function,

WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104
pc : usb_ep_queue+0x7c/0x104
lr : fsg_main_thread+0x494/0x1b3c

Root cause is mass storage function try to queue request from main thread,
but other thread may already disable ep when function disable.

As there is no function failure in the driver, in order to avoid effort
to fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224739">SUSE bug 1224739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35823</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix unicode buffer corruption when deleting characters

This is the same issue that was fixed for the VGA text buffer in commit
39cdb68c64d8 ("vt: fix memory overlapping when deleting chars in the
buffer"). The cure is also the same i.e. replace memcpy() with memmove()
due to the overlaping buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224692">SUSE bug 1224692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35825</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35825" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: ncm: Fix handling of zero block length packets

While connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX
set to 65536, it has been observed that we receive short packets,
which come at interval of 5-10 seconds sometimes and have block
length zero but still contain 1-2 valid datagrams present.

According to the NCM spec:

"If wBlockLength = 0x0000, the block is terminated by a
short packet. In this case, the USB transfer must still
be shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If
exactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,
and the size is a multiple of wMaxPacketSize for the
given pipe, then no ZLP shall be sent.

wBlockLength= 0x0000 must be used with extreme care, because
of the possibility that the host and device may get out of
sync, and because of test issues.

wBlockLength = 0x0000 allows the sender to reduce latency by
starting to send a very large NTB, and then shortening it when
the sender discovers that there's not sufficient data to justify
sending a large NTB"

However, there is a potential issue with the current implementation,
as it checks for the occurrence of multiple NTBs in a single
giveback by verifying if the leftover bytes to be processed is zero
or not. If the block length reads zero, we would process the same
NTB infintely because the leftover bytes is never zero and it leads
to a crash. Fix this by bailing out if block length reads zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224681">SUSE bug 1224681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()

In the for statement of lbs_allocate_cmd_buffer(), if the allocation of
cmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to
be freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224622">SUSE bug 1224622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/lima: fix a memleak in lima_heap_alloc

When lima_vm_map_bo fails, the resources need to be deallocated, or
there will be memleaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224707">SUSE bug 1224707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: tc358743: register v4l2 async device only after successful setup

Ensure the device has been setup correctly before registering the v4l2
async device, thus allowing userspace to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224680">SUSE bug 1224680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35833</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA

This dma_alloc_coherent() is undone neither in the remove function, nor in
the error handling path of fsl_qdma_probe().

Switch to the managed version to fix both issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224632">SUSE bug 1224632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a double-free in arfs_create_groups

When `in` allocated by kvzalloc fails, arfs_create_groups will free
ft-&gt;g and return an error. However, arfs_create_table, the only caller of
arfs_create_groups, will hold this error and call to
mlx5e_destroy_flow_table, in which the ft-&gt;g will be freed again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224605">SUSE bug 1224605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35837</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mvpp2: clear BM pool before initialization

Register value persist after booting the kernel using
kexec which results in kernel panic. Thus clear the
BM pool registers before initialisation to fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224500">SUSE bug 1224500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35845</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: dbg-tlv: ensure NUL termination

The iwl_fw_ini_debug_info_tlv is used as a string, so we must
ensure the string is terminated correctly before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224731">SUSE bug 1224731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35847</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35847" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Prevent double free on error

The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.

Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().

[ tglx: Massaged change log ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224697">SUSE bug 1224697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eeprom: at24: fix memory corruption race condition

If the eeprom is not accessible, an nvmem device will be registered, the
read will fail, and the device will be torn down. If another driver
accesses the nvmem device after the teardown, it will reference
invalid memory.

Move the failure point before registering the nvmem device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224612">SUSE bug 1224612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix information leak in btrfs_ioctl_logical_to_ino()

Syzbot reported the following information leak for in
btrfs_ioctl_logical_to_ino():

  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
  BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40
   instrument_copy_to_user include/linux/instrumented.h:114 [inline]
   _copy_to_user+0xbc/0x110 lib/usercopy.c:40
   copy_to_user include/linux/uaccess.h:191 [inline]
   btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499
   btrfs_ioctl+0x714/0x1260
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:904 [inline]
   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890
   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890
   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Uninit was created at:
   __kmalloc_large_node+0x231/0x370 mm/slub.c:3921
   __do_kmalloc_node mm/slub.c:3954 [inline]
   __kmalloc_node+0xb07/0x1060 mm/slub.c:3973
   kmalloc_node include/linux/slab.h:648 [inline]
   kvmalloc_node+0xc0/0x2d0 mm/util.c:634
   kvmalloc include/linux/slab.h:766 [inline]
   init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779
   btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480
   btrfs_ioctl+0x714/0x1260
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:904 [inline]
   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890
   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890
   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Bytes 40-65535 of 65536 are uninitialized
  Memory access of size 65536 starts at ffff888045a40000

This happens, because we're copying a 'struct btrfs_data_container' back
to user-space. This btrfs_data_container is allocated in
'init_data_container()' via kvmalloc(), which does not zero-fill the
memory.

Fix this by using kvzalloc() which zeroes out the memory on allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224733">SUSE bug 1224733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix NULL-deref on non-serdev suspend

Qualcomm ROME controllers can be registered from the Bluetooth line
discipline and in this case the HCI UART serdev pointer is NULL.

Add the missing sanity check to prevent a NULL-pointer dereference when
wakeup() is called for a non-serdev controller during suspend.

Just return true for now to restore the original behaviour and address
the crash with pre-6.2 kernels, which do not have commit e9b3e5b8c657
("Bluetooth: hci_qca: only assign wakeup with serial port support") that
causes the crash to happen already at setup() time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224509">SUSE bug 1224509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35852</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work

The rehash delayed work is rescheduled with a delay if the number of
credits at end of the work is not negative as supposedly it means that
the migration ended. Otherwise, it is rescheduled immediately.

After "mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
rehash" the above is no longer accurate as a non-negative number of
credits is no longer indicative of the migration being done. It can also
happen if the work encountered an error in which case the migration will
resume the next time the work is scheduled.

The significance of the above is that it is possible for the work to be
pending and associated with hints that were allocated when the migration
started. This leads to the hints being leaked [1] when the work is
canceled while pending as part of ACL region dismantle.

Fix by freeing the hints if hints are associated with a work that was
canceled while pending.

Blame the original commit since the reliance on not having a pending
work associated with hints is fragile.

[1]
unreferenced object 0xffff88810e7c3000 (size 256):
  comm "kworker/0:16", pid 176, jiffies 4295460353
  hex dump (first 32 bytes):
    00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80  .0......a.......
    00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00  ..a.@...........
  backtrace (crc 2544ddb9):
    [&lt;00000000cf8cfab3&gt;] kmalloc_trace+0x23f/0x2a0
    [&lt;000000004d9a1ad9&gt;] objagg_hints_get+0x42/0x390
    [&lt;000000000b143cf3&gt;] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400
    [&lt;0000000059bdb60a&gt;] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160
    [&lt;00000000e81fd734&gt;] process_one_work+0x59c/0xf20
    [&lt;00000000ceee9e81&gt;] worker_thread+0x799/0x12c0
    [&lt;00000000bda6fe39&gt;] kthread+0x246/0x300
    [&lt;0000000070056d23&gt;] ret_from_fork+0x34/0x70
    [&lt;00000000dea2b93e&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224502">SUSE bug 1224502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix memory leak during rehash

The rehash delayed work migrates filters from one region to another.
This is done by iterating over all chunks (all the filters with the same
priority) in the region and in each chunk iterating over all the
filters.

If the migration fails, the code tries to migrate the filters back to
the old region. However, the rollback itself can also fail in which case
another migration will be erroneously performed. Besides the fact that
this ping pong is not a very good idea, it also creates a problem.

Each virtual chunk references two chunks: The currently used one
('vchunk-&gt;chunk') and a backup ('vchunk-&gt;chunk2'). During migration the
first holds the chunk we want to migrate filters to and the second holds
the chunk we are migrating filters from.

The code currently assumes - but does not verify - that the backup chunk
does not exist (NULL) if the currently used chunk does not reference the
target region. This assumption breaks when we are trying to rollback a
rollback, resulting in the backup chunk being overwritten and leaked
[1].

Fix by not rolling back a failed rollback and add a warning to avoid
future cases.

[1]
WARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20
Modules linked in:
CPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G        W          6.9.0-rc2-custom-00784-gc6a05c468a0b #14
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:parman_destroy+0x17/0x20
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_region_fini+0x19/0x60
 mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224604">SUSE bug 1224604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash

The rehash delayed work migrates filters from one region to another
according to the number of available credits.

The migrated from region is destroyed at the end of the work if the
number of credits is non-negative as the assumption is that this is
indicative of migration being complete. This assumption is incorrect as
a non-negative number of credits can also be the result of a failed
migration.

The destruction of a region that still has filters referencing it can
result in a use-after-free [1].

Fix by not destroying the region if migration failed.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230
Read of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858

CPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G        W          6.9.0-rc2-custom-00782-gf2275c2157d8 #5
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xce/0x670
 kasan_report+0xd7/0x110
 mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230
 mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70
 mlxsw_sp_acl_atcam_entry_del+0x81/0x210
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 174:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 __kmalloc+0x19c/0x360
 mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30

Freed by task 7:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 poison_slab_object+0x102/0x170
 __kasan_slab_free+0x14/0x30
 kfree+0xc1/0x290
 mlxsw_sp_acl_tcam_region_destroy+0x272/0x310
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update

The rule activity update delayed work periodically traverses the list of
configured rules and queries their activity from the device.

As part of this task it accesses the entry pointed by 'ventry-&gt;entry',
but this entry can be changed concurrently by the rehash delayed work,
leading to a use-after-free [1].

Fix by closing the race and perform the activity query under the
'vregion-&gt;lock' mutex.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140
Read of size 8 at addr ffff8881054ed808 by task kworker/0:18/181

CPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xce/0x670
 kasan_report+0xd7/0x110
 mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140
 mlxsw_sp_acl_rule_activity_update_work+0x219/0x400
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 1039:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 __kmalloc+0x19c/0x360
 mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30

Freed by task 1039:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 poison_slab_object+0x102/0x170
 __kasan_slab_free+0x14/0x30
 kfree+0xc1/0x290
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224694">SUSE bug 1224694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35857</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp: prevent possible NULL dereferences from icmp_build_probe()

First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.

if (__in_dev_get_rcu(dev) &amp;&amp; __in_dev_get_rcu(dev)-&gt;ifa_list)

Second problem is a read from dev-&gt;ip6_ptr with no NULL check:

if (!list_empty(&amp;rcu_dereference(dev-&gt;ip6_ptr)-&gt;addr_list))

Use the correct RCU API to fix these.

v2: add missing include &lt;net/addrconf.h&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224619">SUSE bug 1224619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: support deferring bpf_link dealloc to after RCU grace period

BPF link for some program types is passed as a "context" which can be
used by those BPF programs to look up additional information. E.g., for
multi-kprobes and multi-uprobes, link is used to fetch BPF cookie values.

Because of this runtime dependency, when bpf_link refcnt drops to zero
there could still be active BPF programs running accessing link data.

This patch adds generic support to defer bpf_link dealloc callback to
after RCU GP, if requested. This is done by exposing two different
deallocation callbacks, one synchronous and one deferred. If deferred
one is provided, bpf_link_free() will schedule dealloc_deferred()
callback to happen after RCU GP.

BPF is using two flavors of RCU: "classic" non-sleepable one and RCU
tasks trace one. The latter is used when sleepable BPF programs are
used. bpf_link_free() accommodates that by checking underlying BPF
program's sleepable flag, and goes either through normal RCU GP only for
non-sleepable, or through RCU tasks trace GP *and* then normal RCU GP
(taking into account rcu_trace_implies_rcu_gp() optimization), if BPF
program is sleepable.

We use this for multi-kprobe and multi-uprobe links, which dereference
link during program run. We also preventively switch raw_tp link to use
deferred dealloc callback, as upcoming changes in bpf-next tree expose
raw_tp link data (specifically, cookie value) to BPF program at runtime
as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224531">SUSE bug 1224531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225312">SUSE bug 1225312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35862</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_network_name_deleted()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225311">SUSE bug 1225311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in is_valid_oplock_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225011">SUSE bug 1225011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35864</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_valid_lease_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225309">SUSE bug 1225309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35865</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35865" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_valid_oplock_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224668">SUSE bug 1224668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35866</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_dump_full_key()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224667">SUSE bug 1224667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_show()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225012">SUSE bug 1225012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_write()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35869</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: guarantee refcounted children from parent session

Avoid potential use-after-free bugs when walking DFS referrals,
mounting and performing DFS failover by ensuring that all children
from parent @tcon-&gt;ses are also refcounted.  They're all needed across
the entire DFS mount.  Get rid of @tcon-&gt;dfs_ses_list while we're at
it, too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226328">SUSE bug 1226328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35870</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in smb2_reconnect_server()

The UAF bug is due to smb2_reconnect_server() accessing a session that
is already being teared down by another thread that is executing
__cifs_put_smb_ses().  This can happen when (a) the client has
connection to the server but no session or (b) another thread ends up
setting @ses-&gt;ses_status again to something different than
SES_EXITING.

To fix this, we need to make sure to unconditionally set
@ses-&gt;ses_status to SES_EXITING and prevent any other threads from
setting a new status while we're still tearing it down.

The following can be reproduced by adding some delay to right after
the ipc is freed in __cifs_put_smb_ses() - which will give
smb2_reconnect_server() worker a chance to run and then accessing
@ses-&gt;ipc:

kinit ...
mount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10
[disconnect srv]
ls /mnt/1 &amp;&gt;/dev/null
sleep 30
kdestroy
[reconnect srv]
sleep 10
umount /mnt/1
...
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
general protection fault, probably for non-canonical address
0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39
04/01/2014
Workqueue: cifsiod smb2_reconnect_server [cifs]
RIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0
Code: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad
de 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 &lt;48&gt; 8b 01 48 39 f8 75
7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8
RSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83
RAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b
RDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800
RBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000
R13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000
FS: 0000000000000000(0000) GS:ffff888157c00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? die_addr+0x36/0x90
 ? exc_general_protection+0x1c1/0x3f0
 ? asm_exc_general_protection+0x26/0x30
 ? __list_del_entry_valid_or_report+0x33/0xf0
 __cifs_put_smb_ses+0x1ae/0x500 [cifs]
 smb2_reconnect_server+0x4ed/0x710 [cifs]
 process_one_work+0x205/0x6b0
 worker_thread+0x191/0x360
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe2/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224672">SUSE bug 1224672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35872</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix GUP-fast succeeding on secretmem folios

folio_is_secretmem() currently relies on secretmem folios being LRU
folios, to save some cycles.

However, folios might reside in a folio batch without the LRU flag set, or
temporarily have their LRU flag cleared.  Consequently, the LRU flag is
unreliable for this purpose.

In particular, this is the case when secretmem_fault() allocates a fresh
page and calls filemap_add_folio()-&gt;folio_add_lru().  The folio might be
added to the per-cpu folio batch and won't get the LRU flag set until the
batch was drained using e.g., lru_add_drain().

Consequently, folio_is_secretmem() might not detect secretmem folios and
GUP-fast can succeed in grabbing a secretmem folio, crashing the kernel
when we would later try reading/writing to the folio, because the folio
has been unmapped from the directmap.

Fix it by removing that unreliable check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224530">SUSE bug 1224530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35875</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/coco: Require seeding RNG with RDRAND on CoCo systems

There are few uses of CoCo that don't rely on working cryptography and
hence a working RNG. Unfortunately, the CoCo threat model means that the
VM host cannot be trusted and may actively work against guests to
extract secrets or manipulate computation. Since a malicious host can
modify or observe nearly all inputs to guests, the only remaining source
of entropy for CoCo guests is RDRAND.

If RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole
is meant to gracefully continue on gathering entropy from other sources,
but since there aren't other sources on CoCo, this is catastrophic.
This is mostly a concern at boot time when initially seeding the RNG, as
after that the consequences of a broken RDRAND are much more
theoretical.

So, try at boot to seed the RNG using 256 bits of RDRAND output. If this
fails, panic(). This will also trigger if the system is booted without
RDRAND, as RDRAND is essential for a safe CoCo boot.

Add this deliberately to be "just a CoCo x86 driver feature" and not
part of the RNG itself. Many device drivers and platforms have some
desire to contribute something to the RNG, and add_device_randomness()
is specifically meant for this purpose.

Any driver can call it with seed data of any quality, or even garbage
quality, and it can only possibly make the quality of the RNG better or
have no effect, but can never make it worse.

Rather than trying to build something into the core of the RNG, consider
the particular CoCo issue just a CoCo issue, and therefore separate it
all out into driver (well, arch/platform) code.

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224665">SUSE bug 1224665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35877</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm/pat: fix VM_PAT handling in COW mappings

PAT handling won't do the right thing in COW mappings: the first PTE (or,
in fact, all PTEs) can be replaced during write faults to point at anon
folios.  Reliably recovering the correct PFN and cachemode using
follow_phys() from PTEs will not work in COW mappings.

Using follow_phys(), we might just get the address+protection of the anon
folio (which is very wrong), or fail on swap/nonswap entries, failing
follow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and
track_pfn_copy(), not properly calling free_pfn_range().

In free_pfn_range(), we either wouldn't call memtype_free() or would call
it with the wrong range, possibly leaking memory.

To fix that, let's update follow_phys() to refuse returning anon folios,
and fallback to using the stored PFN inside vma-&gt;vm_pgoff for COW mappings
if we run into that.

We will now properly handle untrack_pfn() with COW mappings, where we
don't need the cachemode.  We'll have to fail fork()-&gt;track_pfn_copy() if
the first page was replaced by an anon folio, though: we'd have to store
the cachemode in the VMA to make this work, likely growing the VMA size.

For now, lets keep it simple and let track_pfn_copy() just fail in that
case: it would have failed in the past with swap/nonswap entries already,
and it would have done the wrong thing with anon folios.

Simple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():

&lt;--- C reproducer ---&gt;
 #include &lt;stdio.h&gt;
 #include &lt;sys/mman.h&gt;
 #include &lt;unistd.h&gt;
 #include &lt;liburing.h&gt;

 int main(void)
 {
         struct io_uring_params p = {};
         int ring_fd;
         size_t size;
         char *map;

         ring_fd = io_uring_setup(1, &amp;p);
         if (ring_fd &lt; 0) {
                 perror("io_uring_setup");
                 return 1;
         }
         size = p.sq_off.array + p.sq_entries * sizeof(unsigned);

         /* Map the submission queue ring MAP_PRIVATE */
         map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,
                    ring_fd, IORING_OFF_SQ_RING);
         if (map == MAP_FAILED) {
                 perror("mmap");
                 return 1;
         }

         /* We have at least one page. Let's COW it. */
         *map = 0;
         pause();
         return 0;
 }
&lt;--- C reproducer ---&gt;

On a system with 16 GiB RAM and swap configured:
 # ./iouring &amp;
 # memhog 16G
 # killall iouring
[  301.552930] ------------[ cut here ]------------
[  301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100
[  301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g
[  301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1
[  301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4
[  301.559569] RIP: 0010:untrack_pfn+0xf4/0x100
[  301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000
[  301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282
[  301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047
[  301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200
[  301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000
[  301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000
[  301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000
[  301.564186] FS:  0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000
[  301.564773] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0
[  301.565725] PKRU: 55555554
[  301.565944] Call Trace:
[  301.566148]  &lt;TASK&gt;
[  301.566325]  ? untrack_pfn+0xf4/0x100
[  301.566618]  ? __warn+0x81/0x130
[  301.566876]  ? untrack_pfn+0xf4/0x100
[  3
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224525">SUSE bug 1224525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35878</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: module: prevent NULL pointer dereference in vsnprintf()

In of_modalias(), we can get passed the str and len parameters which would
cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr
when the length is also 0. Also, we need to filter out the negative values
of the len parameter as these will result in a really huge buffer since
snprintf() takes size_t parameter while ours is ssize_t...

Found by Linux Verification Center (linuxtesting.org) with the Svace static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35879</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: dynamic: Synchronize of_changeset_destroy() with the devlink removals

In the following sequence:
  1) of_platform_depopulate()
  2) of_overlay_remove()

During the step 1, devices are destroyed and devlinks are removed.
During the step 2, OF nodes are destroyed but
__of_changeset_entry_destroy() can raise warnings related to missing
of_node_put():
  ERROR: memory leak, expected refcount 1 instead of 2 ...

Indeed, during the devlink removals performed at step 1, the removal
itself releasing the device (and the attached of_node) is done by a job
queued in a workqueue and so, it is done asynchronously with respect to
function calls.
When the warning is present, of_node_put() will be called but wrongly
too late from the workqueue job.

In order to be sure that any ongoing devlink removals are done before
the of_node destruction, synchronize the of_changeset_destroy() with the
devlink removals.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224524">SUSE bug 1224524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: do not accept non-tunnel GSO skbs landing in a tunnel

When rx-udp-gro-forwarding is enabled UDP packets might be GROed when
being forwarded. If such packets might land in a tunnel this can cause
various issues and udp_gro_receive makes sure this isn't the case by
looking for a matching socket. This is performed in
udp4/6_gro_lookup_skb but only in the current netns. This is an issue
with tunneled packets when the endpoint is in another netns. In such
cases the packets will be GROed at the UDP level, which leads to various
issues later on. The same thing can happen with rx-gro-list.

We saw this with geneve packets being GROed at the UDP level. In such
case gso_size is set; later the packet goes through the geneve rx path,
the geneve header is pulled, the offset are adjusted and frag_list skbs
are not adjusted with regard to geneve. When those skbs hit
skb_fragment, it will misbehave. Different outcomes are possible
depending on what the GROed skbs look like; from corrupted packets to
kernel crashes.

One example is a BUG_ON[1] triggered in skb_segment while processing the
frag_list. Because gso_size is wrong (geneve header was pulled)
skb_segment thinks there is "geneve header size" of data in frag_list,
although it's in fact the next packet. The BUG_ON itself has nothing to
do with the issue. This is only one of the potential issues.

Looking up for a matching socket in udp_gro_receive is fragile: the
lookup could be extended to all netns (not speaking about performances)
but nothing prevents those packets from being modified in between and we
could still not find a matching socket. It's OK to keep the current
logic there as it should cover most cases but we also need to make sure
we handle tunnel packets being GROed too early.

This is done by extending the checks in udp_unexpected_gso: GSO packets
lacking the SKB_GSO_UDP_TUNNEL/_CSUM bits and landing in a tunnel must
be segmented.

[1] kernel BUG at net/core/skbuff.c:4408!
    RIP: 0010:skb_segment+0xd2a/0xf70
    __udp_gso_segment+0xaa/0x560
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224520">SUSE bug 1224520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35885</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxbf_gige: stop interface during shutdown

The mlxbf_gige driver intermittantly encounters a NULL pointer
exception while the system is shutting down via "reboot" command.
The mlxbf_driver will experience an exception right after executing
its shutdown() method.  One example of this exception is:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000011d373000
[0000000000000070] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 96000004 [#1] SMP
CPU: 0 PID: 13 Comm: ksoftirqd/0 Tainted: G S         OE     5.15.0-bf.6.gef6992a #1
Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS 4.0.2.12669 Apr 21 2023
pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]
lr : mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]
sp : ffff8000080d3c10
x29: ffff8000080d3c10 x28: ffffcce72cbb7000 x27: ffff8000080d3d58
x26: ffff0000814e7340 x25: ffff331cd1a05000 x24: ffffcce72c4ea008
x23: ffff0000814e4b40 x22: ffff0000814e4d10 x21: ffff0000814e4128
x20: 0000000000000000 x19: ffff0000814e4a80 x18: ffffffffffffffff
x17: 000000000000001c x16: ffffcce72b4553f4 x15: ffff80008805b8a7
x14: 0000000000000000 x13: 0000000000000030 x12: 0101010101010101
x11: 7f7f7f7f7f7f7f7f x10: c2ac898b17576267 x9 : ffffcce720fa5404
x8 : ffff000080812138 x7 : 0000000000002e9a x6 : 0000000000000080
x5 : ffff00008de3b000 x4 : 0000000000000000 x3 : 0000000000000001
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]
 mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]
 __napi_poll+0x40/0x1c8
 net_rx_action+0x314/0x3a0
 __do_softirq+0x128/0x334
 run_ksoftirqd+0x54/0x6c
 smpboot_thread_fn+0x14c/0x190
 kthread+0x10c/0x110
 ret_from_fork+0x10/0x20
Code: 8b070000 f9000ea0 f95056c0 f86178a1 (b9407002)
---[ end trace 7cc3941aa0d8e6a4 ]---
Kernel panic - not syncing: Oops: Fatal exception in interrupt
Kernel Offset: 0x4ce722520000 from 0xffff800008000000
PHYS_OFFSET: 0x80000000
CPU features: 0x000005c1,a3330e5a
Memory Limit: none
---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

During system shutdown, the mlxbf_gige driver's shutdown() is always executed.
However, the driver's stop() method will only execute if networking interface
configuration logic within the Linux distribution has been setup to do so.

If shutdown() executes but stop() does not execute, NAPI remains enabled
and this can lead to an exception if NAPI is scheduled while the hardware
interface has only been partially deinitialized.

The networking interface managed by the mlxbf_gige driver must be properly
stopped during system shutdown so that IFF_UP is cleared, the hardware
interface is put into a clean state, and NAPI is fully deinitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224519">SUSE bug 1224519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35886</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix infinite recursion in fib6_dump_done().

syzkaller reported infinite recursive calls of fib6_dump_done() during
netlink socket destruction.  [1]

From the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then
the response was generated.  The following recvmmsg() resumed the dump
for IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due
to the fault injection.  [0]

  12:01:34 executing program 3:
  r0 = socket$nl_route(0x10, 0x3, 0x0)
  sendmsg$nl_route(r0, ... snip ...)
  recvmmsg(r0, ... snip ...) (fail_nth: 8)

Here, fib6_dump_done() was set to nlk_sk(sk)-&gt;cb.done, and the next call
of inet6_dump_fib() set it to nlk_sk(sk)-&gt;cb.args[3].  syzkaller stopped
receiving the response halfway through, and finally netlink_sock_destruct()
called nlk_sk(sk)-&gt;cb.done().

fib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-&gt;cb.done() if it
is still not NULL.  fib6_dump_end() rewrites nlk_sk(sk)-&gt;cb.done() by
nlk_sk(sk)-&gt;cb.args[3], but it has the same function, not NULL, calling
itself recursively and hitting the stack guard page.

To avoid the issue, let's set the destructor after kzalloc().

[0]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl (lib/dump_stack.c:117)
 should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)
 should_failslab (mm/slub.c:3733)
 kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)
 inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)
 rtnl_dump_all (net/core/rtnetlink.c:4029)
 netlink_dump (net/netlink/af_netlink.c:2269)
 netlink_recvmsg (net/netlink/af_netlink.c:1988)
 ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)
 ___sys_recvmsg (net/socket.c:2846)
 do_recvmmsg (net/socket.c:2943)
 __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)

[1]:
BUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)
stack guard page: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)
Code: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd &lt;53&gt; 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc9000d980000 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3
RDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358
RBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000
R13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68
FS:  0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;#DF&gt;
 &lt;/#DF&gt;
 &lt;TASK&gt;
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 ...
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 netlink_sock_destruct (net/netlink/af_netlink.c:401)
 __sk_destruct (net/core/sock.c:2177 (discriminator 2))
 sk_destruct (net/core/sock.c:2224)
 __sk_free (net/core/sock.c:2235)
 sk_free (net/core/sock.c:2246)
 process_one_work (kernel/workqueue.c:3259)
 worker_thread (kernel/workqueue.c:3329 kernel/workqueue.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224670">SUSE bug 1224670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35887</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: fix use-after-free bugs caused by ax25_ds_del_timer

When the ax25 device is detaching, the ax25_dev_device_down()
calls ax25_ds_del_timer() to cleanup the slave_timer. When
the timer handler is running, the ax25_ds_del_timer() that
calls del_timer() in it will return directly. As a result,
the use-after-free bugs could happen, one of the scenarios
is shown below:

      (Thread 1)          |      (Thread 2)
                          | ax25_ds_timeout()
ax25_dev_device_down()    |
  ax25_ds_del_timer()     |
    del_timer()           |
  ax25_dev_put() //FREE   |
                          |  ax25_dev-&gt; //USE

In order to mitigate bugs, when the device is detaching, use
timer_shutdown_sync() to stop the timer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224663">SUSE bug 1224663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35888</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35888" ref_url="https://www.suse.com/security/cve/CVE-2024-35888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erspan: make sure erspan_base_hdr is present in skb-&gt;head

syzbot reported a problem in ip6erspan_rcv() [1]

Issue is that ip6erspan_rcv() (and erspan_rcv()) no longer make
sure erspan_base_hdr is present in skb linear part (skb-&gt;head)
before getting @ver field from it.

Add the missing pskb_may_pull() calls.

v2: Reload iph pointer in erspan_rcv() after pskb_may_pull()
    because skb-&gt;head might have changed.

[1]

 BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]
 BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2756 [inline]
 BUG: KMSAN: uninit-value in ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]
 BUG: KMSAN: uninit-value in gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610
  pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]
  pskb_may_pull include/linux/skbuff.h:2756 [inline]
  ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]
  gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610
  ip6_protocol_deliver_rcu+0x1d4c/0x2ca0 net/ipv6/ip6_input.c:438
  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
  dst_input include/net/dst.h:460 [inline]
  ip6_rcv_finish+0x955/0x970 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ipv6_rcv+0xde/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5538 [inline]
  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5652
  netif_receive_skb_internal net/core/dev.c:5738 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5798
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1549
  tun_get_user+0x5566/0x69e0 drivers/net/tun.c:2002
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2108 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb63/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xe0 fs/read_write.c:652
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3804 [inline]
  slab_alloc_node mm/slub.c:3845 [inline]
  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
  alloc_skb include/linux/skbuff.h:1318 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
  tun_alloc_skb drivers/net/tun.c:1525 [inline]
  tun_get_user+0x209a/0x69e0 drivers/net/tun.c:1846
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2108 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb63/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xe0 fs/read_write.c:652
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

CPU: 1 PID: 5045 Comm: syz-executor114 Not tainted 6.9.0-rc1-syzkaller-00021-g962490525cff #0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35888/">CVE-2024-35888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224518">SUSE bug 1224518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix kernel panic on unknown packet types

In the very rare case where a packet type is unknown to the driver,
idpf_rx_process_skb_fields would return early without calling
eth_type_trans to set the skb protocol / the network layer handler.
This is especially problematic if tcpdump is running when such a
packet is received, i.e. it would cause a kernel panic.

Instead, call eth_type_trans for every single packet, even when
the packet type is unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224517">SUSE bug 1224517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35890</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gro: fix ownership transfer

If packets are GROed with fraglist they might be segmented later on and
continue their journey in the stack. In skb_segment_list those skbs can
be reused as-is. This is an issue as their destructor was removed in
skb_gro_receive_list but not the reference to their socket, and then
they can't be orphaned. Fix this by also removing the reference to the
socket.

For example this could be observed,

  kernel BUG at include/linux/skbuff.h:3131!  (skb_orphan)
  RIP: 0010:ip6_rcv_core+0x11bc/0x19a0
  Call Trace:
   ipv6_list_rcv+0x250/0x3f0
   __netif_receive_skb_list_core+0x49d/0x8f0
   netif_receive_skb_list_internal+0x634/0xd40
   napi_complete_done+0x1d2/0x7d0
   gro_cell_poll+0x118/0x1f0

A similar construction is found in skb_gro_receive, apply the same
change there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224516">SUSE bug 1224516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35893</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_skbmod: prevent kernel-infoleak

syzbot found that tcf_skbmod_dump() was copying four bytes
from kernel stack to user space [1].

The issue here is that 'struct tc_skbmod' has a four bytes hole.

We need to clear the structure before filling fields.

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]
 BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
  instrument_copy_to_user include/linux/instrumented.h:114 [inline]
  copy_to_user_iter lib/iov_iter.c:24 [inline]
  iterate_ubuf include/linux/iov_iter.h:29 [inline]
  iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
  iterate_and_advance include/linux/iov_iter.h:271 [inline]
  _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
  copy_to_iter include/linux/uio.h:196 [inline]
  simple_copy_to_iter net/core/datagram.c:532 [inline]
  __skb_datagram_iter+0x185/0x1000 net/core/datagram.c:420
  skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
  skb_copy_datagram_msg include/linux/skbuff.h:4050 [inline]
  netlink_recvmsg+0x432/0x1610 net/netlink/af_netlink.c:1962
  sock_recvmsg_nosec net/socket.c:1046 [inline]
  sock_recvmsg+0x2c4/0x340 net/socket.c:1068
  __sys_recvfrom+0x35a/0x5f0 net/socket.c:2242
  __do_sys_recvfrom net/socket.c:2260 [inline]
  __se_sys_recvfrom net/socket.c:2256 [inline]
  __x64_sys_recvfrom+0x126/0x1d0 net/socket.c:2256
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was stored to memory at:
  pskb_expand_head+0x30f/0x19d0 net/core/skbuff.c:2253
  netlink_trim+0x2c2/0x330 net/netlink/af_netlink.c:1317
  netlink_unicast+0x9f/0x1260 net/netlink/af_netlink.c:1351
  nlmsg_unicast include/net/netlink.h:1144 [inline]
  nlmsg_notify+0x21d/0x2f0 net/netlink/af_netlink.c:2610
  rtnetlink_send+0x73/0x90 net/core/rtnetlink.c:741
  rtnetlink_maybe_send include/linux/rtnetlink.h:17 [inline]
  tcf_add_notify net/sched/act_api.c:2048 [inline]
  tcf_action_add net/sched/act_api.c:2071 [inline]
  tc_ctl_action+0x146e/0x19d0 net/sched/act_api.c:2119
  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2559
  rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6613
  netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
  netlink_unicast+0xf4c/0x1260 net/netlink/af_netlink.c:1361
  netlink_sendmsg+0x10df/0x11f0 net/netlink/af_netlink.c:1905
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  ____sys_sendmsg+0x877/0xb60 net/socket.c:2584
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
  __sys_sendmsg net/socket.c:2667 [inline]
  __do_sys_sendmsg net/socket.c:2676 [inline]
  __se_sys_sendmsg net/socket.c:2674 [inline]
  __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was stored to memory at:
  __nla_put lib/nlattr.c:1041 [inline]
  nla_put+0x1c6/0x230 lib/nlattr.c:1099
  tcf_skbmod_dump+0x23f/0xc20 net/sched/act_skbmod.c:256
  tcf_action_dump_old net/sched/act_api.c:1191 [inline]
  tcf_action_dump_1+0x85e/0x970 net/sched/act_api.c:1227
  tcf_action_dump+0x1fd/0x460 net/sched/act_api.c:1251
  tca_get_fill+0x519/0x7a0 net/sched/act_api.c:1628
  tcf_add_notify_msg net/sched/act_api.c:2023 [inline]
  tcf_add_notify net/sched/act_api.c:2042 [inline]
  tcf_action_add net/sched/act_api.c:2071 [inline]
  tc_ctl_action+0x1365/0x19d0 net/sched/act_api.c:2119
  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netli
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224512">SUSE bug 1224512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35895</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Prevent lock inversion deadlock in map delete elem

syzkaller started using corpuses where a BPF tracing program deletes
elements from a sockmap/sockhash map. Because BPF tracing programs can be
invoked from any interrupt context, locks taken during a map_delete_elem
operation must be hardirq-safe. Otherwise a deadlock due to lock inversion
is possible, as reported by lockdep:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;htab-&gt;buckets[i].lock);
                               local_irq_disable();
                               lock(&amp;host-&gt;lock);
                               lock(&amp;htab-&gt;buckets[i].lock);
  &lt;Interrupt&gt;
    lock(&amp;host-&gt;lock);

Locks in sockmap are hardirq-unsafe by design. We expects elements to be
deleted from sockmap/sockhash only in task (normal) context with interrupts
enabled, or in softirq context.

Detect when map_delete_elem operation is invoked from a context which is
_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an
error.

Note that map updates are not affected by this issue. BPF verifier does not
allow updating sockmap/sockhash from a BPF tracing program today.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: validate user input for expected length

I got multiple syzbot reports showing old bugs exposed
by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc
in cgroup/{s,g}etsockopt")

setsockopt() @optlen argument should be taken into account
before copying data.

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
 BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
Read of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238

CPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a
RIP: 0033:0x7fd22067dde9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8
 &lt;/TASK&gt;

Allocated by task 7238:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:4069 [inline]
  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082
  kmalloc_noprof include/linux/slab.h:664 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a

The buggy address belongs to the object at ffff88802cd73da0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 0 bytes inside of
 allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73
flags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)
page_type: 0xffffefff(slab)
raw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122
raw: ffff88802cd73020 000000008080007f 00000001ffffefff 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224662">SUSE bug 1224662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: discard table flag update with pending basechain deletion

Hook unregistration is deferred to the commit phase, same occurs with
hook updates triggered by the table dormant flag. When both commands are
combined, this results in deleting a basechain while leaving its hook
still registered in the core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224510">SUSE bug 1224510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()

nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can
concurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().
And thhere is not any protection when iterate over nf_tables_flowtables
list in __nft_flowtable_type_get(). Therefore, there is pertential
data-race of nf_tables_flowtables list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_flowtables list
in __nft_flowtable_type_get(), and use rcu_read_lock() in the caller
nft_flowtable_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224498">SUSE bug 1224498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: flush pending destroy work before exit_net release

Similar to 2c9f0293280e ("netfilter: nf_tables: flush pending destroy
work before netlink notifier") to address a race between exit_net and
the destroy workqueue.

The trace below shows an element to be released via destroy workqueue
while exit_net path (triggered via module removal) has already released
the set that is used in such transaction.

[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465
[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359
[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]
[ 1360.547984] Call Trace:
[ 1360.547991]  &lt;TASK&gt;
[ 1360.547998]  dump_stack_lvl+0x53/0x70
[ 1360.548014]  print_report+0xc4/0x610
[ 1360.548026]  ? __virt_addr_valid+0xba/0x160
[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548176]  kasan_report+0xae/0xe0
[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]
[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30
[ 1360.548591]  process_one_work+0x2f1/0x670
[ 1360.548610]  worker_thread+0x4d3/0x760
[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10
[ 1360.548640]  kthread+0x16b/0x1b0
[ 1360.548653]  ? __pfx_kthread+0x10/0x10
[ 1360.548665]  ret_from_fork+0x2f/0x50
[ 1360.548679]  ? __pfx_kthread+0x10/0x10
[ 1360.548690]  ret_from_fork_asm+0x1a/0x30
[ 1360.548707]  &lt;/TASK&gt;

[ 1360.548719] Allocated by task 192061:
[ 1360.548726]  kasan_save_stack+0x20/0x40
[ 1360.548739]  kasan_save_track+0x14/0x30
[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0
[ 1360.548760]  __kmalloc_node+0x1f1/0x450
[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]
[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]
[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]
[ 1360.548927]  netlink_unicast+0x367/0x4f0
[ 1360.548935]  netlink_sendmsg+0x34b/0x610
[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510
[ 1360.548953]  ___sys_sendmsg+0xc9/0x120
[ 1360.548961]  __sys_sendmsg+0xbe/0x140
[ 1360.548971]  do_syscall_64+0x55/0x120
[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d

[ 1360.548994] Freed by task 192222:
[ 1360.548999]  kasan_save_stack+0x20/0x40
[ 1360.549009]  kasan_save_track+0x14/0x30
[ 1360.549019]  kasan_save_free_info+0x3b/0x60
[ 1360.549028]  poison_slab_object+0x100/0x180
[ 1360.549036]  __kasan_slab_free+0x14/0x30
[ 1360.549042]  kfree+0xb6/0x260
[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]
[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]
[ 1360.549221]  ops_exit_list+0x50/0xa0
[ 1360.549229]  free_exit_list+0x101/0x140
[ 1360.549236]  unregister_pernet_operations+0x107/0x160
[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30
[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]
[ 1360.549345]  __do_sys_delete_module+0x253/0x370
[ 1360.549352]  do_syscall_64+0x55/0x120
[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d

(gdb) list *__nft_release_table+0x473
0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).
11349           list_for_each_entry_safe(flowtable, nf, &amp;table-&gt;flowtables, list) {
11350                   list_del(&amp;flowtable-&gt;list);
11351                   nft_use_dec(&amp;table-&gt;use);
11352                   nf_tables_flowtable_destroy(flowtable);
11353           }
11354           list_for_each_entry_safe(set, ns, &amp;table-&gt;sets, list) {
11355                   list_del(&amp;set-&gt;list);
11356                   nft_use_dec(&amp;table-&gt;use);
11357                   if (set-&gt;flags &amp; (NFT_SET_MAP | NFT_SET_OBJECT))
11358                           nft_map_deactivat
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224499">SUSE bug 1224499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject new basechain after table flag update

When dormant flag is toggled, hooks are disabled in the commit phase by
iterating over current chains in table (existing and new).

The following configuration allows for an inconsistent state:

  add table x
  add chain x y { type filter hook input priority 0; }
  add table x { flags dormant; }
  add chain x w { type filter hook input priority 1; }

which triggers the following warning when trying to unregister chain w
which is already unregistered.

[  127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50                                                                     1 __nf_unregister_net_hook+0x21a/0x260
[...]
[  127.322519] Call Trace:
[  127.322521]  &lt;TASK&gt;
[  127.322524]  ? __warn+0x9f/0x1a0
[  127.322531]  ? __nf_unregister_net_hook+0x21a/0x260
[  127.322537]  ? report_bug+0x1b1/0x1e0
[  127.322545]  ? handle_bug+0x3c/0x70
[  127.322552]  ? exc_invalid_op+0x17/0x40
[  127.322556]  ? asm_exc_invalid_op+0x1a/0x20
[  127.322563]  ? kasan_save_free_info+0x3b/0x60
[  127.322570]  ? __nf_unregister_net_hook+0x6a/0x260
[  127.322577]  ? __nf_unregister_net_hook+0x21a/0x260
[  127.322583]  ? __nf_unregister_net_hook+0x6a/0x260
[  127.322590]  ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables]
[  127.322655]  nft_table_disable+0x75/0xf0 [nf_tables]
[  127.322717]  nf_tables_commit+0x2571/0x2620 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224497">SUSE bug 1224497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix Rx DMA datasize and skb_over_panic

mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be
multiple of 64. So a packet slightly bigger than mtu+14, say 1536,
can be received and cause skb_over_panic.

Sample dmesg:
[ 5325.237162] skbuff: skb_over_panic: text:ffffffffc043277a len:1536 put:1536 head:ff1100018b517000 data:ff1100018b517100 tail:0x700 end:0x6ea dev:&lt;NULL&gt;
[ 5325.243689] ------------[ cut here ]------------
[ 5325.245748] kernel BUG at net/core/skbuff.c:192!
[ 5325.247838] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 5325.258374] RIP: 0010:skb_panic+0x4f/0x60
[ 5325.302941] Call Trace:
[ 5325.304389]  &lt;IRQ&gt;
[ 5325.315794]  ? skb_panic+0x4f/0x60
[ 5325.317457]  ? asm_exc_invalid_op+0x1f/0x30
[ 5325.319490]  ? skb_panic+0x4f/0x60
[ 5325.321161]  skb_put+0x4e/0x50
[ 5325.322670]  mana_poll+0x6fa/0xb50 [mana]
[ 5325.324578]  __napi_poll+0x33/0x1e0
[ 5325.326328]  net_rx_action+0x12e/0x280

As discussed internally, this alignment is not necessary. To fix
this bug, remove it from the code. So oversized packets will be
marked as CQE_RX_TRUNCATED by NIC, and dropped.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35902</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/rds: fix possible cp null dereference

cp might be null, calling cp-&gt;cp_conn would produce null dereference

[Simon Horman adds:]

Analysis:

* cp is a parameter of __rds_rdma_map and is not reassigned.

* The following call-sites pass a NULL cp argument to __rds_rdma_map()

  - rds_get_mr()
  - rds_get_mr_for_dest

* Prior to the code above, the following assumes that cp may be NULL
  (which is indicative, but could itself be unnecessary)

	trans_private = rs-&gt;rs_transport-&gt;get_mr(
		sg, nents, rs, &amp;mr-&gt;r_key, cp ? cp-&gt;cp_conn : NULL,
		args-&gt;vec.addr, args-&gt;vec.bytes,
		need_odp ? ODP_ZEROBASED : ODP_NOT_NEEDED);

* The code modified by this patch is guarded by IS_ERR(trans_private),
  where trans_private is assigned as per the previous point in this analysis.

  The only implementation of get_mr that I could locate is rds_ib_get_mr()
  which can return an ERR_PTR if the conn (4th) argument is NULL.

* ret is set to PTR_ERR(trans_private).
  rds_ib_get_mr can return ERR_PTR(-ENODEV) if the conn (4th) argument is NULL.
  Thus ret may be -ENODEV in which case the code in question will execute.

Conclusion:
* cp may be NULL at the point where this patch adds a check;
  this patch does seem to address a possible bug
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224496">SUSE bug 1224496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: avoid dereference of garbage after mount failure

In case kern_mount() fails and returns an error pointer return in the
error branch instead of continuing and dereferencing the error pointer.

While on it drop the never read static variable selinuxfs_mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Protect against int overflow for stack access size

This patch re-introduces protection against the size of access to stack
memory being negative; the access size can appear negative as a result
of overflowing its signed int representation. This should not actually
happen, as there are other protections along the way, but we should
protect against it anyway. One code path was missing such protections
(fixed in the previous patch in the series), causing out-of-bounds array
accesses in check_stack_range_initialized(). This patch causes the
verification of a program with such a non-sensical access size to fail.

This check used to exist in a more indirect way, but was inadvertendly
removed in a833a17aeac7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226327">SUSE bug 1226327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35907</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxbf_gige: call request_irq() after NAPI initialized

The mlxbf_gige driver encounters a NULL pointer exception in
mlxbf_gige_open() when kdump is enabled.  The sequence to reproduce
the exception is as follows:
a) enable kdump
b) trigger kdump via "echo c &gt; /proc/sysrq-trigger"
c) kdump kernel executes
d) kdump kernel loads mlxbf_gige module
e) the mlxbf_gige module runs its open() as the
   the "oob_net0" interface is brought up
f) mlxbf_gige module will experience an exception
   during its open(), something like:

     Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
     Mem abort info:
       ESR = 0x0000000086000004
       EC = 0x21: IABT (current EL), IL = 32 bits
       SET = 0, FnV = 0
       EA = 0, S1PTW = 0
       FSC = 0x04: level 0 translation fault
     user pgtable: 4k pages, 48-bit VAs, pgdp=00000000e29a4000
     [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
     Internal error: Oops: 0000000086000004 [#1] SMP
     CPU: 0 PID: 812 Comm: NetworkManager Tainted: G           OE     5.15.0-1035-bluefield #37-Ubuntu
     Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.6.0.13024 Jan 19 2024
     pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
     pc : 0x0
     lr : __napi_poll+0x40/0x230
     sp : ffff800008003e00
     x29: ffff800008003e00 x28: 0000000000000000 x27: 00000000ffffffff
     x26: ffff000066027238 x25: ffff00007cedec00 x24: ffff800008003ec8
     x23: 000000000000012c x22: ffff800008003eb7 x21: 0000000000000000
     x20: 0000000000000001 x19: ffff000066027238 x18: 0000000000000000
     x17: ffff578fcb450000 x16: ffffa870b083c7c0 x15: 0000aaab010441d0
     x14: 0000000000000001 x13: 00726f7272655f65 x12: 6769675f6662786c
     x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa870b0842398
     x8 : 0000000000000004 x7 : fe5a48b9069706ea x6 : 17fdb11fc84ae0d2
     x5 : d94a82549d594f35 x4 : 0000000000000000 x3 : 0000000000400100
     x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000066027238
     Call trace:
      0x0
      net_rx_action+0x178/0x360
      __do_softirq+0x15c/0x428
      __irq_exit_rcu+0xac/0xec
      irq_exit+0x18/0x2c
      handle_domain_irq+0x6c/0xa0
      gic_handle_irq+0xec/0x1b0
      call_on_irq_stack+0x20/0x2c
      do_interrupt_handler+0x5c/0x70
      el1_interrupt+0x30/0x50
      el1h_64_irq_handler+0x18/0x2c
      el1h_64_irq+0x7c/0x80
      __setup_irq+0x4c0/0x950
      request_threaded_irq+0xf4/0x1bc
      mlxbf_gige_request_irqs+0x68/0x110 [mlxbf_gige]
      mlxbf_gige_open+0x5c/0x170 [mlxbf_gige]
      __dev_open+0x100/0x220
      __dev_change_flags+0x16c/0x1f0
      dev_change_flags+0x2c/0x70
      do_setlink+0x220/0xa40
      __rtnl_newlink+0x56c/0x8a0
      rtnl_newlink+0x58/0x84
      rtnetlink_rcv_msg+0x138/0x3c4
      netlink_rcv_skb+0x64/0x130
      rtnetlink_rcv+0x20/0x30
      netlink_unicast+0x2ec/0x360
      netlink_sendmsg+0x278/0x490
      __sock_sendmsg+0x5c/0x6c
      ____sys_sendmsg+0x290/0x2d4
      ___sys_sendmsg+0x84/0xd0
      __sys_sendmsg+0x70/0xd0
      __arm64_sys_sendmsg+0x2c/0x40
      invoke_syscall+0x78/0x100
      el0_svc_common.constprop.0+0x54/0x184
      do_el0_svc+0x30/0xac
      el0_svc+0x48/0x160
      el0t_64_sync_handler+0xa4/0x12c
      el0t_64_sync+0x1a4/0x1a8
     Code: bad PC value
     ---[ end trace 7d1c3f3bf9d81885 ]---
     Kernel panic - not syncing: Oops: Fatal exception in interrupt
     Kernel Offset: 0x2870a7a00000 from 0xffff800008000000
     PHYS_OFFSET: 0x80000000
     CPU features: 0x0,000005c1,a3332a5a
     Memory Limit: none
     ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

The exception happens because there is a pending RX interrupt before the
call to request_irq(RX IRQ) executes.  Then, the RX IRQ handler fires
immediately after this request_irq() completes. The
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224492">SUSE bug 1224492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: rfi: fix potential response leaks

If the rx payload length check fails, or if kmemdup() fails,
we still need to free the command response. Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224487">SUSE bug 1224487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix error cleanup path in nfsd_rename()

Commit a8b0026847b8 ("rename(): avoid a deadlock in the case of parents
having no common ancestor") added an error bail out path. However this
path does not drop the remount protection that has been acquired. Fix
the cleanup path to properly drop the remount protection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet

syzbot reported the following uninit-value access issue [1][2]:

nci_rx_work() parses and processes received packet. When the payload
length is zero, each message type handler reads uninitialized payload
and KMSAN detects this issue. The receipt of a packet with a zero-size
payload is considered unexpected, and therefore, such packets should be
silently discarded.

This patch resolved this issue by checking payload size before calling
each message type handler codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224479">SUSE bug 1224479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35922</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbmon: prevent division by zero in fb_videomode_from_videomode()

The expression htotal * vtotal can have a zero value on
overflow. It is necessary to prevent division by zero like in
fb_var_to_videomode().

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224660">SUSE bug 1224660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Limit read size on v1.2

Between UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was
increased from 16 to 256. In order to avoid overflowing reads for older
systems, add a mechanism to use the read UCSI version to truncate read
sizes on UCSI v1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224657">SUSE bug 1224657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: prevent division by zero in blk_rq_stat_sum()

The expression dst-&gt;nr_samples + src-&gt;nr_samples may
have zero value on overflow. It is necessary to add
a check to avoid division by zero.

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224661">SUSE bug 1224661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()

The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an
unsuccessful status.  In such cases, the elsiocb is not issued, the
completion is not called, and thus the elsiocb resource is leaked.

Check return value after calling lpfc_sli4_resume_rpi() and conditionally
release the elsiocb resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224651">SUSE bug 1224651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: don't check if plane-&gt;state-&gt;fb == state-&gt;fb

Currently, when using non-blocking commits, we can see the following
kernel warning:

[  110.908514] ------------[ cut here ]------------
[  110.908529] refcount_t: underflow; use-after-free.
[  110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0
[  110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6
[  110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G         C         6.1.66-v8+ #32
[  110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)
[  110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  110.909132] pc : refcount_dec_not_one+0xb8/0xc0
[  110.909152] lr : refcount_dec_not_one+0xb4/0xc0
[  110.909170] sp : ffffffc00913b9c0
[  110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60
[  110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480
[  110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78
[  110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000
[  110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004
[  110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003
[  110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00
[  110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572
[  110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000
[  110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001
[  110.909434] Call trace:
[  110.909441]  refcount_dec_not_one+0xb8/0xc0
[  110.909461]  vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]
[  110.909903]  vc4_cleanup_fb+0x44/0x50 [vc4]
[  110.910315]  drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]
[  110.910669]  vc4_atomic_commit_tail+0x390/0x9dc [vc4]
[  110.911079]  commit_tail+0xb0/0x164 [drm_kms_helper]
[  110.911397]  drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]
[  110.911716]  drm_atomic_commit+0xb0/0xdc [drm]
[  110.912569]  drm_mode_atomic_ioctl+0x348/0x4b8 [drm]
[  110.913330]  drm_ioctl_kernel+0xec/0x15c [drm]
[  110.914091]  drm_ioctl+0x24c/0x3b0 [drm]
[  110.914850]  __arm64_sys_ioctl+0x9c/0xd4
[  110.914873]  invoke_syscall+0x4c/0x114
[  110.914897]  el0_svc_common+0xd0/0x118
[  110.914917]  do_el0_svc+0x38/0xd0
[  110.914936]  el0_svc+0x30/0x8c
[  110.914958]  el0t_64_sync_handler+0x84/0xf0
[  110.914979]  el0t_64_sync+0x18c/0x190
[  110.914996] ---[ end trace 0000000000000000 ]---

This happens because, although `prepare_fb` and `cleanup_fb` are
perfectly balanced, we cannot guarantee consistency in the check
plane-&gt;state-&gt;fb == state-&gt;fb. This means that sometimes we can increase
the refcount in `prepare_fb` and don't decrease it in `cleanup_fb`. The
opposite can also be true.

In fact, the struct drm_plane .state shouldn't be accessed directly
but instead, the `drm_atomic_get_new_plane_state()` helper function should
be used. So, we could stick to this check, but using
`drm_atomic_get_new_plane_state()`. But actually, this check is not re
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224650">SUSE bug 1224650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35933</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btintel: Fix null ptr deref in btintel_read_version

If hci_cmd_sync_complete() is triggered and skb is NULL, then
hdev-&gt;req_skb is NULL, which will cause this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224640">SUSE bug 1224640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()

Many syzbot reports show extreme rtnl pressure, and many of them hint
that smc acquires rtnl in netns creation for no good reason [1]

This patch returns early from smc_pnet_net_init()
if there is no netdevice yet.

I am not even sure why smc_pnet_create_pnetids_list() even exists,
because smc_pnet_netdev_event() is also calling
smc_pnet_add_base_pnetid() when handling NETDEV_UP event.

[1] extract of typical syzbot reports

2 locks held by syz-executor.3/12252:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12253:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12257:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12261:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.0/12265:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.3/12268:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12271:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12274:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12280:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224641">SUSE bug 1224641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35935</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: send: handle path ref underflow in header iterate_inode_ref()

Change BUG_ON to proper error handling if building the path buffer
fails. The pointers are not printed so we don't accidentally leak kernel
addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224645">SUSE bug 1224645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35936</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()

The unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,
as it could be caused only by two impossible conditions:

- at first the search key is set up to look for a chunk tree item, with
  offset -1, this is an inexact search and the key-&gt;offset will contain
  the correct offset upon a successful search, a valid chunk tree item
  cannot have an offset -1

- after first successful search, the found_key corresponds to a chunk
  item, the offset is decremented by 1 before the next loop, it's
  impossible to find a chunk item there due to alignment and size
  constraints
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224644">SUSE bug 1224644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35937</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: check A-MSDU format more carefully

If it looks like there's another subframe in the A-MSDU
but the header isn't fully there, we can end up reading
data out of bounds, only to discard later. Make this a
bit more careful and check if the subframe header can
even be present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: decrease MHI channel buffer length to 8KB

Currently buf_len field of ath11k_mhi_config_qca6390 is assigned
with 0, making MHI use a default size, 64KB, to allocate channel
buffers. This is likely to fail in some scenarios where system
memory is highly fragmented and memory compaction or reclaim is
not allowed.

There is a fail report which is caused by it:
kworker/u32:45: page allocation failure: order:4, mode:0x40c00(GFP_NOIO|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
CPU: 0 PID: 19318 Comm: kworker/u32:45 Not tainted 6.8.0-rc3-1.gae4495f-default #1 openSUSE Tumbleweed (unreleased) 493b6d5b382c603654d7a81fc3c144d59a1dfceb
Workqueue: events_unbound async_run_entry_fn
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x47/0x60
 warn_alloc+0x13a/0x1b0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? __alloc_pages_direct_compact+0xab/0x210
 __alloc_pages_slowpath.constprop.0+0xd3e/0xda0
 __alloc_pages+0x32d/0x350
 ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 __kmalloc_large_node+0x72/0x110
 __kmalloc+0x37c/0x480
 ? mhi_map_single_no_bb+0x77/0xf0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 __mhi_prepare_for_transfer+0x44/0x80 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 ? __pfx_____mhi_prepare_for_transfer+0x10/0x10 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 device_for_each_child+0x5c/0xa0
 ? __pfx_pci_pm_resume+0x10/0x10
 ath11k_core_resume+0x65/0x100 [ath11k a5094e22d7223135c40d93c8f5321cf09fd85e4e]
 ? srso_alias_return_thunk+0x5/0xfbef5
 ath11k_pci_pm_resume+0x32/0x60 [ath11k_pci 830b7bfc3ea80ebef32e563cafe2cb55e9cc73ec]
 ? srso_alias_return_thunk+0x5/0xfbef5
 dpm_run_callback+0x8c/0x1e0
 device_resume+0x104/0x340
 ? __pfx_dpm_watchdog_handler+0x10/0x10
 async_resume+0x1d/0x30
 async_run_entry_fn+0x32/0x120
 process_one_work+0x168/0x330
 worker_thread+0x2f5/0x410
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe8/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Actually those buffers are used only by QMI target -&gt; host communication.
And for WCN6855 and QCA6390, the largest packet size for that is less
than 6KB. So change buf_len field to 8KB, which results in order 1
allocation if page size is 4KB. In this way, we can at least save some
memory, and as well as decrease the possibility of allocation failure
in those scenarios.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224643">SUSE bug 1224643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-direct: Leak pages on dma_set_decrypted() failure

On TDX it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

DMA could free decrypted/shared pages if dma_set_decrypted() fails. This
should be a rare case. Just leak the pages in this case instead of
freeing them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224535">SUSE bug 1224535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35940</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/zone: Add a null pointer check to the psz_kmsg_read

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224537">SUSE bug 1224537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35943</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: ti: Add a null pointer check to the omap_prm_domain_init

devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224649">SUSE bug 1224649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35944</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()

Syzkaller hit 'WARNING in dg_dispatch_as_host' bug.

memcpy: detected field-spanning write (size 56) of single field "&amp;dg_info-&gt;msg"
at drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)

WARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237
dg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237

Some code commentry, based on my understanding:

544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-&gt;payload_size)
/// This is 24 + payload_size

memcpy(&amp;dg_info-&gt;msg, dg, dg_size);
	Destination = dg_info-&gt;msg ---&gt; this is a 24 byte
					structure(struct vmci_datagram)
	Source = dg --&gt; this is a 24 byte structure (struct vmci_datagram)
	Size = dg_size = 24 + payload_size

{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.

 35 struct delayed_datagram_info {
 36         struct datagram_entry *entry;
 37         struct work_struct work;
 38         bool in_dg_host_queue;
 39         /* msg and msg_payload must be together. */
 40         struct vmci_datagram msg;
 41         u8 msg_payload[];
 42 };

So those extra bytes of payload are copied into msg_payload[], a run time
warning is seen while fuzzing with Syzkaller.

One possible way to fix the warning is to split the memcpy() into
two parts -- one -- direct assignment of msg and second taking care of payload.

Gustavo quoted:
"Under FORTIFY_SOURCE we should not copy data across multiple members
in a structure."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224648">SUSE bug 1224648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: phy_device: Prevent nullptr exceptions on ISR

If phydev-&gt;irq is set unconditionally, check
for valid interrupt handler or fall back to polling mode to prevent
nullptr exceptions in interrupt service routine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224639">SUSE bug 1224639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35947</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dyndbg: fix old BUG_ON in &gt;control parser

Fix a BUG_ON from 2009.  Even if it looks "unreachable" (I didn't
really look), lets make sure by removing it, doing pr_err and return
-EINVAL instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224647">SUSE bug 1224647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35949</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: make sure that WRITTEN is set on all metadata blocks

We previously would call btrfs_check_leaf() if we had the check
integrity code enabled, which meant that we could only run the extended
leaf checks if we had WRITTEN set on the header flags.

This leaves a gap in our checking, because we could end up with
corruption on disk where WRITTEN isn't set on the leaf, and then the
extended leaf checks don't get run which we rely on to validate all of
the item pointers to make sure we don't access memory outside of the
extent buffer.

However, since 732fab95abe2 ("btrfs: check-integrity: remove
CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call
btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only
ever call it on blocks that are being written out, and thus have WRITTEN
set, or that are being read in, which should have WRITTEN set.

Add checks to make sure we have WRITTEN set appropriately, and then make
sure __btrfs_check_leaf() always does the item checking.  This will
protect us from file systems that have been corrupted and no longer have
WRITTEN set on some of the blocks.

This was hit on a crafted image tweaking the WRITTEN bit and reported by
KASAN as out-of-bound access in the eb accessors. The example is a dir
item at the end of an eb.

  [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2
  [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI
  [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f]
  [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1
  [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0
  [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206
  [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0
  [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748
  [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9
  [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a
  [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8
  [2.621] FS:  00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000
  [2.621] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0
  [2.621] Call Trace:
  [2.621]  &lt;TASK&gt;
  [2.621]  ? show_regs+0x74/0x80
  [2.621]  ? die_addr+0x46/0xc0
  [2.621]  ? exc_general_protection+0x161/0x2a0
  [2.621]  ? asm_exc_general_protection+0x26/0x30
  [2.621]  ? btrfs_get_16+0x33a/0x6d0
  [2.621]  ? btrfs_get_16+0x34b/0x6d0
  [2.621]  ? btrfs_get_16+0x33a/0x6d0
  [2.621]  ? __pfx_btrfs_get_16+0x10/0x10
  [2.621]  ? __pfx_mutex_unlock+0x10/0x10
  [2.621]  btrfs_match_dir_item_name+0x101/0x1a0
  [2.621]  btrfs_lookup_dir_item+0x1f3/0x280
  [2.621]  ? __pfx_btrfs_lookup_dir_item+0x10/0x10
  [2.621]  btrfs_get_tree+0xd25/0x1910

[ copy more details from report ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229273">SUSE bug 1229273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35950</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2797-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex

The modes[] array contains pointers to modes on the connectors'
mode lists, which are protected by dev-&gt;mode_config.mutex.
Thus we need to extend modes[] the same protection or by the
time we use it the elements may already be pointing to
freed/reused memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225310">SUSE bug 1225310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35951</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()

Subject: [PATCH] drm/panfrost: Fix the error path in
 panfrost_mmu_map_fault_addr()

If some the pages or sgt allocation failed, we shouldn't release the
pages ref we got earlier, otherwise we will end up with unbalanced
get/put_pages() calls. We should instead leave everything in place
and let the BO release function deal with extra cleanup when the object
is destroyed, or let the fault handler try again next time it's called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224701">SUSE bug 1224701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35952</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ast: Fix soft lockup

There is a while-loop in ast_dp_set_on_off() that could lead to
infinite-loop. This is because the register, VGACRI-Dx, checked in
this API is a scratch register actually controlled by a MCU, named
DPMCU, in BMC.

These scratch registers are protected by scu-lock. If suc-lock is not
off, DPMCU can not update these registers and then host will have soft
lockup due to never updated status.

DPMCU is used to control DP and relative registers to handshake with
host's VGA driver. Even the most time-consuming task, DP's link
training, is less than 100ms. 200ms should be enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224705">SUSE bug 1224705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35955</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kprobes: Fix possible use-after-free issue on kprobe registration

When unloading a module, its state is changing MODULE_STATE_LIVE -&gt;
 MODULE_STATE_GOING -&gt; MODULE_STATE_UNFORMED. Each change will take
a time. `is_module_text_address()` and `__module_text_address()`
works with MODULE_STATE_LIVE and MODULE_STATE_GOING.
If we use `is_module_text_address()` and `__module_text_address()`
separately, there is a chance that the first one is succeeded but the
next one is failed because module-&gt;state becomes MODULE_STATE_UNFORMED
between those operations.

In `check_kprobe_address_safe()`, if the second `__module_text_address()`
is failed, that is ignored because it expected a kernel_text address.
But it may have failed simply because module-&gt;state has been changed
to MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify
non-exist module text address (use-after-free).

To fix this problem, we should not use separated `is_module_text_address()`
and `__module_text_address()`, but use only `__module_text_address()`
once and do `try_module_get(module)` which is only available with
MODULE_STATE_LIVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224676">SUSE bug 1224676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35956</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations

Create subvolume, create snapshot and delete subvolume all use
btrfs_subvolume_reserve_metadata() to reserve metadata for the changes
done to the parent subvolume's fs tree, which cannot be mediated in the
normal way via start_transaction. When quota groups (squota or qgroups)
are enabled, this reserves qgroup metadata of type PREALLOC. Once the
operation is associated to a transaction, we convert PREALLOC to
PERTRANS, which gets cleared in bulk at the end of the transaction.

However, the error paths of these three operations were not implementing
this lifecycle correctly. They unconditionally converted the PREALLOC to
PERTRANS in a generic cleanup step regardless of errors or whether the
operation was fully associated to a transaction or not. This resulted in
error paths occasionally converting this rsv to PERTRANS without calling
record_root_in_trans successfully, which meant that unless that root got
recorded in the transaction by some other thread, the end of the
transaction would not free that root's PERTRANS, leaking it. Ultimately,
this resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount
for the leaked reservation.

The fix is to ensure that every qgroup PREALLOC reservation observes the
following properties:

1. any failure before record_root_in_trans is called successfully
   results in freeing the PREALLOC reservation.
2. after record_root_in_trans, we convert to PERTRANS, and now the
   transaction owns freeing the reservation.

This patch enforces those properties on the three operations. Without
it, generic/269 with squotas enabled at mkfs time would fail in ~5-10
runs on my system. With this patch, it ran successfully 1000 times in a
row.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224674">SUSE bug 1224674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35958</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ena: Fix incorrect descriptor free behavior

ENA has two types of TX queues:
- queues which only process TX packets arriving from the network stack
- queues which only process TX packets forwarded to it by XDP_REDIRECT
  or XDP_TX instructions

The ena_free_tx_bufs() cycles through all descriptors in a TX queue
and unmaps + frees every descriptor that hasn't been acknowledged yet
by the device (uncompleted TX transactions).
The function assumes that the processed TX queue is necessarily from
the first category listed above and ends up using napi_consume_skb()
for descriptors belonging to an XDP specific queue.

This patch solves a bug in which, in case of a VF reset, the
descriptors aren't freed correctly, leading to crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224677">SUSE bug 1224677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35959</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix mlx5e_priv_init() cleanup flow

When mlx5e_priv_init() fails, the cleanup flow calls mlx5e_selq_cleanup which
calls mlx5e_selq_apply() that assures that the `priv-&gt;state_lock` is held using
lockdep_is_held().

Acquire the state_lock in mlx5e_selq_cleanup().

Kernel log:
=============================
WARNING: suspicious RCU usage
6.8.0-rc3_net_next_841a9b5 #1 Not tainted
-----------------------------
drivers/net/ethernet/mellanox/mlx5/core/en/selq.c:124 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
2 locks held by systemd-modules/293:
 #0: ffffffffa05067b0 (devices_rwsem){++++}-{3:3}, at: ib_register_client+0x109/0x1b0 [ib_core]
 #1: ffff8881096c65c0 (&amp;device-&gt;client_data_rwsem){++++}-{3:3}, at: add_client_context+0x104/0x1c0 [ib_core]

stack backtrace:
CPU: 4 PID: 293 Comm: systemd-modules Not tainted 6.8.0-rc3_net_next_841a9b5 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x8a/0xa0
 lockdep_rcu_suspicious+0x154/0x1a0
 mlx5e_selq_apply+0x94/0xa0 [mlx5_core]
 mlx5e_selq_cleanup+0x3a/0x60 [mlx5_core]
 mlx5e_priv_init+0x2be/0x2f0 [mlx5_core]
 mlx5_rdma_setup_rn+0x7c/0x1a0 [mlx5_core]
 rdma_init_netdev+0x4e/0x80 [ib_core]
 ? mlx5_rdma_netdev_free+0x70/0x70 [mlx5_core]
 ipoib_intf_init+0x64/0x550 [ib_ipoib]
 ipoib_intf_alloc+0x4e/0xc0 [ib_ipoib]
 ipoib_add_one+0xb0/0x360 [ib_ipoib]
 add_client_context+0x112/0x1c0 [ib_core]
 ib_register_client+0x166/0x1b0 [ib_core]
 ? 0xffffffffa0573000
 ipoib_init_module+0xeb/0x1a0 [ib_ipoib]
 do_one_initcall+0x61/0x250
 do_init_module+0x8a/0x270
 init_module_from_file+0x8b/0xd0
 idempotent_init_module+0x17d/0x230
 __x64_sys_finit_module+0x61/0xb0
 do_syscall_64+0x71/0x140
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224666">SUSE bug 1224666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35960</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Properly link new fs rules into the tree

Previously, add_rule_fg would only add newly created rules from the
handle into the tree when they had a refcount of 1. On the other hand,
create_flow_handle tries hard to find and reference already existing
identical rules instead of creating new ones.

These two behaviors can result in a situation where create_flow_handle
1) creates a new rule and references it, then
2) in a subsequent step during the same handle creation references it
   again,
resulting in a rule with a refcount of 2 that is not linked into the
tree, will have a NULL parent and root and will result in a crash when
the flow group is deleted because del_sw_hw_rule, invoked on rule
deletion, assumes node-&gt;parent is != NULL.

This happened in the wild, due to another bug related to incorrect
handling of duplicate pkt_reformat ids, which lead to the code in
create_flow_handle incorrectly referencing a just-added rule in the same
flow handle, resulting in the problem described above. Full details are
at [1].

This patch changes add_rule_fg to add new rules without parents into
the tree, properly initializing them and avoiding the crash. This makes
it more consistent with how rules are added to an FTE in
create_flow_handle.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224588">SUSE bug 1224588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Register devlink first under devlink lock

In case device is having a non fatal FW error during probe, the
driver will report the error to user via devlink. This will trigger
a WARN_ON, since mlx5 is calling devlink_register() last.
In order to avoid the WARN_ON[1], change mlx5 to invoke devl_register()
first under devlink lock.

[1]
WARNING: CPU: 5 PID: 227 at net/devlink/health.c:483 devlink_recover_notify.constprop.0+0xb8/0xc0
CPU: 5 PID: 227 Comm: kworker/u16:3 Not tainted 6.4.0-rc5_for_upstream_min_debug_2023_06_12_12_38 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_health0000:08:00.0 mlx5_fw_reporter_err_work [mlx5_core]
RIP: 0010:devlink_recover_notify.constprop.0+0xb8/0xc0
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x79/0x120
 ? devlink_recover_notify.constprop.0+0xb8/0xc0
 ? report_bug+0x17c/0x190
 ? handle_bug+0x3c/0x60
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? devlink_recover_notify.constprop.0+0xb8/0xc0
 devlink_health_report+0x4a/0x1c0
 mlx5_fw_reporter_err_work+0xa4/0xd0 [mlx5_core]
 process_one_work+0x1bb/0x3c0
 ? process_one_work+0x3c0/0x3c0
 worker_thread+0x4d/0x3c0
 ? process_one_work+0x3c0/0x3c0
 kthread+0xc6/0xf0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224585">SUSE bug 1224585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35962</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: complete validation of user input

In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.

In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:

if ((u64)optlen &lt; (u64)tmp.size + sizeof(tmp))
        return -EINVAL;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224583">SUSE bug 1224583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35963</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224582">SUSE bug 1224582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35964</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224581">SUSE bug 1224581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224579">SUSE bug 1224579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: Fix not validating setsockopt user input

syzbot reported rfcomm_sock_setsockopt_old() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old
net/bluetooth/rfcomm/sock.c:632 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70
net/bluetooth/rfcomm/sock.c:673
Read of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224576">SUSE bug 1224576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix not validating setsockopt user input

syzbot reported sco_sock_setsockopt() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90
net/bluetooth/sco.c:893
Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224587">SUSE bug 1224587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr

Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it
still means hlist_for_each_entry_rcu can return an item that got removed
from the list. The memory itself of such item is not freed thanks to RCU
but nothing guarantees the actual content of the memory is sane.

In particular, the reference count can be zero. This can happen if
ipv6_del_addr is called in parallel. ipv6_del_addr removes the entry
from inet6_addr_lst (hlist_del_init_rcu(&amp;ifp-&gt;addr_lst)) and drops all
references (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough
timing, this can happen:

1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.

2. Then, the whole ipv6_del_addr is executed for the given entry. The
   reference count drops to zero and kfree_rcu is scheduled.

3. ipv6_get_ifaddr continues and tries to increments the reference count
   (in6_ifa_hold).

4. The rcu is unlocked and the entry is freed.

5. The freed entry is returned.

Prevent increasing of the reference count in such case. The name
in6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.

[   41.506330] refcount_t: addition on 0; use-after-free.
[   41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130
[   41.507413] Modules linked in: veth bridge stp llc
[   41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14
[   41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
[   41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130
[   41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 &lt;0f&gt; 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff
[   41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282
[   41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000
[   41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900
[   41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff
[   41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000
[   41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48
[   41.514086] FS:  00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000
[   41.514726] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0
[   41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   41.516799] Call Trace:
[   41.517037]  &lt;TASK&gt;
[   41.517249]  ? __warn+0x7b/0x120
[   41.517535]  ? refcount_warn_saturate+0xa5/0x130
[   41.517923]  ? report_bug+0x164/0x190
[   41.518240]  ? handle_bug+0x3d/0x70
[   41.518541]  ? exc_invalid_op+0x17/0x70
[   41.520972]  ? asm_exc_invalid_op+0x1a/0x20
[   41.521325]  ? refcount_warn_saturate+0xa5/0x130
[   41.521708]  ipv6_get_ifaddr+0xda/0xe0
[   41.522035]  inet6_rtm_getaddr+0x342/0x3f0
[   41.522376]  ? __pfx_inet6_rtm_getaddr+0x10/0x10
[   41.522758]  rtnetlink_rcv_msg+0x334/0x3d0
[   41.523102]  ? netlink_unicast+0x30f/0x390
[   41.523445]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[   41.523832]  netlink_rcv_skb+0x53/0x100
[   41.524157]  netlink_unicast+0x23b/0x390
[   41.524484]  netlink_sendmsg+0x1f2/0x440
[   41.524826]  __sys_sendto+0x1d8/0x1f0
[   41.525145]  __x64_sys_sendto+0x1f/0x30
[   41.525467]  do_syscall_64+0xa5/0x1b0
[   41.525794]  entry_SYSCALL_64_after_hwframe+0x72/0x7a
[   41.526213] RIP: 0033:0x7fbc4cfcea9a
[   41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
[   41.527942] RSP: 002b:00007f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224580">SUSE bug 1224580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35971</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ks8851: Handle softirqs at the end of IRQ thread to fix hang

The ks8851_irq() thread may call ks8851_rx_pkts() in case there are
any packets in the MAC FIFO, which calls netif_rx(). This netif_rx()
implementation is guarded by local_bh_disable() and local_bh_enable().
The local_bh_enable() may call do_softirq() to run softirqs in case
any are pending. One of the softirqs is net_rx_action, which ultimately
reaches the driver .start_xmit callback. If that happens, the system
hangs. The entire call chain is below:

ks8851_start_xmit_par from netdev_start_xmit
netdev_start_xmit from dev_hard_start_xmit
dev_hard_start_xmit from sch_direct_xmit
sch_direct_xmit from __dev_queue_xmit
__dev_queue_xmit from __neigh_update
__neigh_update from neigh_update
neigh_update from arp_process.constprop.0
arp_process.constprop.0 from __netif_receive_skb_one_core
__netif_receive_skb_one_core from process_backlog
process_backlog from __napi_poll.constprop.0
__napi_poll.constprop.0 from net_rx_action
net_rx_action from __do_softirq
__do_softirq from call_with_stack
call_with_stack from do_softirq
do_softirq from __local_bh_enable_ip
__local_bh_enable_ip from netif_rx
netif_rx from ks8851_irq
ks8851_irq from irq_thread_fn
irq_thread_fn from irq_thread
irq_thread from kthread
kthread from ret_from_fork

The hang happens because ks8851_irq() first locks a spinlock in
ks8851_par.c ks8851_lock_par() spin_lock_irqsave(&amp;ksp-&gt;lock, ...)
and with that spinlock locked, calls netif_rx(). Once the execution
reaches ks8851_start_xmit_par(), it calls ks8851_lock_par() again
which attempts to claim the already locked spinlock again, and the
hang happens.

Move the do_softirq() call outside of the spinlock protected section
of ks8851_irq() by disabling BHs around the entire spinlock protected
section of ks8851_irq() handler. Place local_bh_enable() outside of
the spinlock protected section, so that it can trigger do_softirq()
without the ks8851_par.c ks8851_lock_par() spinlock being held, and
safely call ks8851_start_xmit_par() without attempting to lock the
already locked spinlock.

Since ks8851_irq() is protected by local_bh_disable()/local_bh_enable()
now, replace netif_rx() with __netif_rx() which is not duplicating the
local_bh_disable()/local_bh_enable() calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224578">SUSE bug 1224578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35973</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

geneve: fix header validation in geneve[6]_xmit_skb

syzbot is able to trigger an uninit-value in geneve_xmit() [1]

Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfield())
uses skb_protocol(skb, true), pskb_inet_may_pull() is only using
skb-&gt;protocol.

If anything else than ETH_P_IPV6 or ETH_P_IP is found in skb-&gt;protocol,
pskb_inet_may_pull() does nothing at all.

If a vlan tag was provided by the caller (af_packet in the syzbot case),
the network header might not point to the correct location, and skb
linear part could be smaller than expected.

Add skb_vlan_inet_prepare() to perform a complete mac validation.

Use this in geneve for the moment, I suspect we need to adopt this
more broadly.

v4 - Jakub reported v3 broke l2_tos_ttl_inherit.sh selftest
   - Only call __vlan_get_protocol() for vlan types.

v2,v3 - Addressed Sabrina comments on v1 and v2

[1]

BUG: KMSAN: uninit-value in geneve_xmit_skb drivers/net/geneve.c:910 [inline]
 BUG: KMSAN: uninit-value in geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030
  geneve_xmit_skb drivers/net/geneve.c:910 [inline]
  geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030
  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
  netdev_start_xmit include/linux/netdevice.h:4917 [inline]
  xmit_one net/core/dev.c:3531 [inline]
  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
  __dev_queue_xmit+0x348d/0x52c0 net/core/dev.c:4335
  dev_queue_xmit include/linux/netdevice.h:3091 [inline]
  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3081 [inline]
  packet_sendmsg+0x8bb0/0x9ef0 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3804 [inline]
  slab_alloc_node mm/slub.c:3845 [inline]
  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
  alloc_skb include/linux/skbuff.h:1318 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
  packet_alloc_skb net/packet/af_packet.c:2930 [inline]
  packet_snd net/packet/af_packet.c:3024 [inline]
  packet_sendmsg+0x722d/0x9ef0 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

CPU: 0 PID: 5033 Comm: syz-executor346 Not tainted 6.9.0-rc1-syzkaller-00005-g928a87efa423 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224586">SUSE bug 1224586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35976</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING

syzbot reported an illegal copy in xsk_setsockopt() [1]

Make sure to validate setsockopt() @optlen parameter.

[1]

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420
Read of size 4 at addr ffff888028c6cde3 by task syz-executor.0/7549

CPU: 0 PID: 7549 Comm: syz-executor.0 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7fb40587de69
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb40665a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69
RDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006
RBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020001980 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08
 &lt;/TASK&gt;

Allocated by task 7549:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3966 [inline]
  __kmalloc+0x233/0x4a0 mm/slub.c:3979
  kmalloc include/linux/slab.h:632 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

The buggy address belongs to the object at ffff888028c6cde0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 1 bytes to the right of
 allocated 2-byte region [ffff888028c6cde0, ffff888028c6cde2)

The buggy address belongs to the physical page:
page:ffffea0000a31b00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028c6c9c0 pfn:0x28c6c
anon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffffff()
raw: 00fff00000000800 ffff888014c41280 0000000000000000 dead000000000001
raw: ffff888028c6c9c0 0000000080800057 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223
  set_page_owner include/linux/page_owner.h:31 [inline]
  post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533
  prep_new_page mm/page_alloc.c:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224575">SUSE bug 1224575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35978</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix memory leak in hci_req_sync_complete()

In 'hci_req_sync_complete()', always free the previous sync
request state before assigning reference to a new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224571">SUSE bug 1224571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35979</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

raid1: fix use-after-free for original bio in raid1_write_request()

r1_bio-&gt;bios[] is used to record new bios that will be issued to
underlying disks, however, in raid1_write_request(), r1_bio-&gt;bios[]
will set to the original bio temporarily. Meanwhile, if blocked rdev
is set, free_r1bio() will be called causing that all r1_bio-&gt;bios[]
to be freed:

raid1_write_request()
 r1_bio = alloc_r1bio(mddev, bio); -&gt; r1_bio-&gt;bios[] is NULL
 for (i = 0;  i &lt; disks; i++) -&gt; for each rdev in conf
  // first rdev is normal
  r1_bio-&gt;bios[0] = bio; -&gt; set to original bio
  // second rdev is blocked
  if (test_bit(Blocked, &amp;rdev-&gt;flags))
   break

 if (blocked_rdev)
  free_r1bio()
   put_all_bios()
    bio_put(r1_bio-&gt;bios[0]) -&gt; original bio is freed

Test scripts:

mdadm -CR /dev/md0 -l1 -n4 /dev/sd[abcd] --assume-clean
fio -filename=/dev/md0 -ioengine=libaio -rw=write -bs=4k -numjobs=1 \
    -iodepth=128 -name=test -direct=1
echo blocked &gt; /sys/block/md0/md/rd2/state

Test result:

BUG bio-264 (Not tainted): Object already free
-----------------------------------------------------------------------------

Allocated in mempool_alloc_slab+0x24/0x50 age=1 cpu=1 pid=869
 kmem_cache_alloc+0x324/0x480
 mempool_alloc_slab+0x24/0x50
 mempool_alloc+0x6e/0x220
 bio_alloc_bioset+0x1af/0x4d0
 blkdev_direct_IO+0x164/0x8a0
 blkdev_write_iter+0x309/0x440
 aio_write+0x139/0x2f0
 io_submit_one+0x5ca/0xb70
 __do_sys_io_submit+0x86/0x270
 __x64_sys_io_submit+0x22/0x30
 do_syscall_64+0xb1/0x210
 entry_SYSCALL_64_after_hwframe+0x6c/0x74
Freed in mempool_free_slab+0x1f/0x30 age=1 cpu=1 pid=869
 kmem_cache_free+0x28c/0x550
 mempool_free_slab+0x1f/0x30
 mempool_free+0x40/0x100
 bio_free+0x59/0x80
 bio_put+0xf0/0x220
 free_r1bio+0x74/0xb0
 raid1_make_request+0xadf/0x1150
 md_handle_request+0xc7/0x3b0
 md_submit_bio+0x76/0x130
 __submit_bio+0xd8/0x1d0
 submit_bio_noacct_nocheck+0x1eb/0x5c0
 submit_bio_noacct+0x169/0xd40
 submit_bio+0xee/0x1d0
 blkdev_direct_IO+0x322/0x8a0
 blkdev_write_iter+0x309/0x440
 aio_write+0x139/0x2f0

Since that bios for underlying disks are not allocated yet, fix this
problem by using mempool_free() directly to free the r1_bio.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224572">SUSE bug 1224572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35980</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: tlb: Fix TLBI RANGE operand

KVM/arm64 relies on TLBI RANGE feature to flush TLBs when the dirty
pages are collected by VMM and the page table entries become write
protected during live migration. Unfortunately, the operand passed
to the TLBI RANGE instruction isn't correctly sorted out due to the
commit 117940aa6e5f ("KVM: arm64: Define kvm_tlb_flush_vmid_range()").
It leads to crash on the destination VM after live migration because
TLBs aren't flushed completely and some of the dirty pages are missed.

For example, I have a VM where 8GB memory is assigned, starting from
0x40000000 (1GB). Note that the host has 4KB as the base page size.
In the middile of migration, kvm_tlb_flush_vmid_range() is executed
to flush TLBs. It passes MAX_TLBI_RANGE_PAGES as the argument to
__kvm_tlb_flush_vmid_range() and __flush_s2_tlb_range_op(). SCALE#3
and NUM#31, corresponding to MAX_TLBI_RANGE_PAGES, isn't supported
by __TLBI_RANGE_NUM(). In this specific case, -1 has been returned
from __TLBI_RANGE_NUM() for SCALE#3/2/1/0 and rejected by the loop
in the __flush_tlb_range_op() until the variable @scale underflows
and becomes -9, 0xffff708000040000 is set as the operand. The operand
is wrong since it's sorted out by __TLBI_VADDR_RANGE() according to
invalid @scale and @num.

Fix it by extending __TLBI_RANGE_NUM() to support the combination of
SCALE#3 and NUM#31. With the changes, [-1 31] instead of [-1 30] can
be returned from the macro, meaning the TLBs for 0x200000 pages in the
above example can be flushed in one shoot with SCALE#3 and NUM#31. The
macro TLBI_RANGE_MASK is dropped since no one uses it any more. The
comments are also adjusted accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224574">SUSE bug 1224574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

batman-adv: Avoid infinite loop trying to resize local TT

If the MTU of one of an attached interface becomes too small to transmit
the local translation table then it must be resized to fit inside all
fragments (when enabled) or a single packet.

But if the MTU becomes too low to transmit even the header + the VLAN
specific part then the resizing of the local TT will never succeed. This
can for example happen when the usable space is 110 bytes and 11 VLANs are
on top of batman-adv. In this case, at least 116 byte would be needed.
There will just be an endless spam of

   batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)

in the log but the function will never finish. Problem here is that the
timeout will be halved all the time and will then stagnate at 0 and
therefore never be able to reduce the table even more.

There are other scenarios possible with a similar result. The number of
BATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too
high to fit inside a packet. Such a scenario can therefore happen also with
only a single VLAN + 7 non-purgable addresses - requiring at least 120
bytes.

While this should be handled proactively when:

* interface with too low MTU is added
* VLAN is added
* non-purgeable local mac is added
* MTU of an attached interface is reduced
* fragmentation setting gets disabled (which most likely requires dropping
  attached interfaces)

not all of these scenarios can be prevented because batman-adv is only
consuming events without the the possibility to prevent these actions
(non-purgable MAC address added, MTU of an attached interface is reduced).
It is therefore necessary to also make sure that the code is able to handle
also the situations when there were already incompatible system
configuration are present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224566">SUSE bug 1224566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35984</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: smbus: fix NULL function pointer dereference

Baruch reported an OOPS when using the designware controller as target
only. Target-only modes break the assumption of one transfer function
always being available. Fix this by always checking the pointer in
__i2c_transfer.

[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224567">SUSE bug 1224567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix oops during rmmod on single-CPU platforms

During the removal of the idxd driver, registered offline callback is
invoked as part of the clean up process. However, on systems with only
one CPU online, no valid target is available to migrate the
perf context, resulting in a kernel oops:

    BUG: unable to handle page fault for address: 000000000002a2b8
    #PF: supervisor write access in kernel mode
    #PF: error_code(0x0002) - not-present page
    PGD 1470e1067 P4D 0
    Oops: 0002 [#1] PREEMPT SMP NOPTI
    CPU: 0 PID: 20 Comm: cpuhp/0 Not tainted 6.8.0-rc6-dsa+ #57
    Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023
    RIP: 0010:mutex_lock+0x2e/0x50
    ...
    Call Trace:
    &lt;TASK&gt;
    __die+0x24/0x70
    page_fault_oops+0x82/0x160
    do_user_addr_fault+0x65/0x6b0
    __pfx___rdmsr_safe_on_cpu+0x10/0x10
    exc_page_fault+0x7d/0x170
    asm_exc_page_fault+0x26/0x30
    mutex_lock+0x2e/0x50
    mutex_lock+0x1e/0x50
    perf_pmu_migrate_context+0x87/0x1f0
    perf_event_cpu_offline+0x76/0x90 [idxd]
    cpuhp_invoke_callback+0xa2/0x4f0
    __pfx_perf_event_cpu_offline+0x10/0x10 [idxd]
    cpuhp_thread_fun+0x98/0x150
    smpboot_thread_fn+0x27/0x260
    smpboot_thread_fn+0x1af/0x260
    __pfx_smpboot_thread_fn+0x10/0x10
    kthread+0x103/0x140
    __pfx_kthread+0x10/0x10
    ret_from_fork+0x31/0x50
    __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1b/0x30
    &lt;TASK&gt;

Fix the issue by preventing the migration of the perf context to an
invalid target.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224558">SUSE bug 1224558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35990</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma: xilinx_dpdma: Fix locking

There are several places where either chan-&gt;lock or chan-&gt;vchan.lock was
not held. Add appropriate locking. This fixes lockdep warnings like

[   31.077578] ------------[ cut here ]------------
[   31.077831] WARNING: CPU: 2 PID: 40 at drivers/dma/xilinx/xilinx_dpdma.c:834 xilinx_dpdma_chan_queue_transfer+0x274/0x5e0
[   31.077953] Modules linked in:
[   31.078019] CPU: 2 PID: 40 Comm: kworker/u12:1 Not tainted 6.6.20+ #98
[   31.078102] Hardware name: xlnx,zynqmp (DT)
[   31.078169] Workqueue: events_unbound deferred_probe_work_func
[   31.078272] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   31.078377] pc : xilinx_dpdma_chan_queue_transfer+0x274/0x5e0
[   31.078473] lr : xilinx_dpdma_chan_queue_transfer+0x270/0x5e0
[   31.078550] sp : ffffffc083bb2e10
[   31.078590] x29: ffffffc083bb2e10 x28: 0000000000000000 x27: ffffff880165a168
[   31.078754] x26: ffffff880164e920 x25: ffffff880164eab8 x24: ffffff880164d480
[   31.078920] x23: ffffff880165a148 x22: ffffff880164e988 x21: 0000000000000000
[   31.079132] x20: ffffffc082aa3000 x19: ffffff880164e880 x18: 0000000000000000
[   31.079295] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   31.079453] x14: 0000000000000000 x13: ffffff8802263dc0 x12: 0000000000000001
[   31.079613] x11: 0001ffc083bb2e34 x10: 0001ff880164e98f x9 : 0001ffc082aa3def
[   31.079824] x8 : 0001ffc082aa3dec x7 : 0000000000000000 x6 : 0000000000000516
[   31.079982] x5 : ffffffc7f8d43000 x4 : ffffff88003c9c40 x3 : ffffffffffffffff
[   31.080147] x2 : ffffffc7f8d43000 x1 : 00000000000000c0 x0 : 0000000000000000
[   31.080307] Call trace:
[   31.080340]  xilinx_dpdma_chan_queue_transfer+0x274/0x5e0
[   31.080518]  xilinx_dpdma_issue_pending+0x11c/0x120
[   31.080595]  zynqmp_disp_layer_update+0x180/0x3ac
[   31.080712]  zynqmp_dpsub_plane_atomic_update+0x11c/0x21c
[   31.080825]  drm_atomic_helper_commit_planes+0x20c/0x684
[   31.080951]  drm_atomic_helper_commit_tail+0x5c/0xb0
[   31.081139]  commit_tail+0x234/0x294
[   31.081246]  drm_atomic_helper_commit+0x1f8/0x210
[   31.081363]  drm_atomic_commit+0x100/0x140
[   31.081477]  drm_client_modeset_commit_atomic+0x318/0x384
[   31.081634]  drm_client_modeset_commit_locked+0x8c/0x24c
[   31.081725]  drm_client_modeset_commit+0x34/0x5c
[   31.081812]  __drm_fb_helper_restore_fbdev_mode_unlocked+0x104/0x168
[   31.081899]  drm_fb_helper_set_par+0x50/0x70
[   31.081971]  fbcon_init+0x538/0xc48
[   31.082047]  visual_init+0x16c/0x23c
[   31.082207]  do_bind_con_driver.isra.0+0x2d0/0x634
[   31.082320]  do_take_over_console+0x24c/0x33c
[   31.082429]  do_fbcon_takeover+0xbc/0x1b0
[   31.082503]  fbcon_fb_registered+0x2d0/0x34c
[   31.082663]  register_framebuffer+0x27c/0x38c
[   31.082767]  __drm_fb_helper_initial_config_and_unlock+0x5c0/0x91c
[   31.082939]  drm_fb_helper_initial_config+0x50/0x74
[   31.083012]  drm_fbdev_dma_client_hotplug+0xb8/0x108
[   31.083115]  drm_client_register+0xa0/0xf4
[   31.083195]  drm_fbdev_dma_setup+0xb0/0x1cc
[   31.083293]  zynqmp_dpsub_drm_init+0x45c/0x4e0
[   31.083431]  zynqmp_dpsub_probe+0x444/0x5e0
[   31.083616]  platform_probe+0x8c/0x13c
[   31.083713]  really_probe+0x258/0x59c
[   31.083793]  __driver_probe_device+0xc4/0x224
[   31.083878]  driver_probe_device+0x70/0x1c0
[   31.083961]  __device_attach_driver+0x108/0x1e0
[   31.084052]  bus_for_each_drv+0x9c/0x100
[   31.084125]  __device_attach+0x100/0x298
[   31.084207]  device_initial_probe+0x14/0x20
[   31.084292]  bus_probe_device+0xd8/0xdc
[   31.084368]  deferred_probe_work_func+0x11c/0x180
[   31.084451]  process_one_work+0x3ac/0x988
[   31.084643]  worker_thread+0x398/0x694
[   31.084752]  kthread+0x1bc/0x1c0
[   31.084848]  ret_from_fork+0x10/0x20
[   31.084932] irq event stamp: 64549
[   31.084970] hardirqs last  enabled at (64548): [&lt;ffffffc081adf35c&gt;] _raw_spin_unlock_irqrestore+0x80/0x90
[   31.085157]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224559">SUSE bug 1224559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Use access_width over bit_width for system memory accesses

To align with ACPI 6.3+, since bit_width can be any 8-bit value, it
cannot be depended on to be always on a clean 8b boundary. This was
uncovered on the Cobalt 100 platform.

SError Interrupt on CPU26, code 0xbe000011 -- SError
 CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1
 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
 pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
 pc : cppc_get_perf_caps+0xec/0x410
 lr : cppc_get_perf_caps+0xe8/0x410
 sp : ffff8000155ab730
 x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078
 x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff
 x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000
 x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff
 x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008
 x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006
 x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec
 x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028
 x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff
 x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000
 Kernel panic - not syncing: Asynchronous SError Interrupt
 CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted
5.15.2.1-13 #1
 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
 Call trace:
  dump_backtrace+0x0/0x1e0
  show_stack+0x24/0x30
  dump_stack_lvl+0x8c/0xb8
  dump_stack+0x18/0x34
  panic+0x16c/0x384
  add_taint+0x0/0xc0
  arm64_serror_panic+0x7c/0x90
  arm64_is_fatal_ras_serror+0x34/0xa4
  do_serror+0x50/0x6c
  el1h_64_error_handler+0x40/0x74
  el1h_64_error+0x7c/0x80
  cppc_get_perf_caps+0xec/0x410
  cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq]
  cpufreq_online+0x2dc/0xa30
  cpufreq_add_dev+0xc0/0xd4
  subsys_interface_register+0x134/0x14c
  cpufreq_register_driver+0x1b0/0x354
  cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq]
  do_one_initcall+0x50/0x250
  do_init_module+0x60/0x27c
  load_module+0x2300/0x2570
  __do_sys_finit_module+0xa8/0x114
  __arm64_sys_finit_module+0x2c/0x3c
  invoke_syscall+0x78/0x100
  el0_svc_common.constprop.0+0x180/0x1a0
  do_el0_svc+0x84/0xa0
  el0_svc+0x2c/0xc0
  el0t_64_sync_handler+0xa4/0x12c
  el0t_64_sync+0x1a4/0x1a8

Instead, use access_width to determine the size and use the offset and
width to shift and mask the bits to read/write out. Make sure to add a
check for system memory since pcc redefines the access_width to
subspace id.

If access_width is not set, then fall back to using bit_width.

[ rjw: Subject and changelog edits, comment adjustments ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224557">SUSE bug 1224557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35997</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

The flag I2C_HID_READ_PENDING is used to serialize I2C operations.
However, this is not necessary, because I2C core already has its own
locking for that.

More importantly, this flag can cause a lock-up: if the flag is set in
i2c_hid_xfer() and an interrupt happens, the interrupt handler
(i2c_hid_irq) will check this flag and return immediately without doing
anything, then the interrupt handler will be invoked again in an
infinite loop.

Since interrupt handler is an RT task, it takes over the CPU and the
flag-clearing task never gets scheduled, thus we have a lock-up.

Delete this unnecessary flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224552">SUSE bug 1224552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35998</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix lock ordering potential deadlock in cifs_sync_mid_result

Coverity spotted that the cifs_sync_mid_result function could deadlock

"Thread deadlock (ORDER_REVERSAL) lock_order: Calling spin_lock acquires
lock TCP_Server_Info.srv_lock while holding lock TCP_Server_Info.mid_lock"

Addresses-Coverity: 1590401 ("Thread deadlock (ORDER_REVERSAL)")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224549">SUSE bug 1224549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35999</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: missing lock when picking channel

Coverity spotted a place where we should have been holding the
channel lock when accessing the ses channel index.

Addresses-Coverity: 1582039 ("Data race condition (MISSING_LOCK)")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224550">SUSE bug 1224550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix missing hugetlb_lock for resv uncharge

There is a recent report on UFFDIO_COPY over hugetlb:

https://lore.kernel.org/all/000000000000ee06de0616177560@google.com/

350:	lockdep_assert_held(&amp;hugetlb_lock);

Should be an issue in hugetlb but triggered in an userfault context, where
it goes into the unlikely path where two threads modifying the resv map
together.  Mike has a fix in that path for resv uncharge but it looks like
the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()
will update the cgroup pointer, so it requires to be called with the lock
held.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224548">SUSE bug 1224548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not use WQ_MEM_RECLAIM flag for workqueue

Issue reported by customer during SRIOV testing, call trace:
When both i40e and the i40iw driver are loaded, a warning
in check_flush_dependency is being triggered. This seems
to be because of the i40e driver workqueue is allocated with
the WQ_MEM_RECLAIM flag, and the i40iw one is not.

Similar error was encountered on ice too and it was fixed by
removing the flag. Do the same for i40e too.

[Feb 9 09:08] ------------[ cut here ]------------
[  +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] is
flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966
check_flush_dependency+0x10b/0x120
[  +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seq
snd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4
nls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtr
rfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdma
intel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssif
isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal
intel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_core
iTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncore
ioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ich
intel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_pad
xfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbe
drm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intel
libata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirror
dm_region_hash dm_log dm_mod fuse
[  +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Not
tainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1
[  +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOS
SE5C620.86B.02.01.0013.121520200651 12/15/2020
[  +0.000001] Workqueue: i40e i40e_service_task [i40e]
[  +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120
[  +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 48
81 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fd
ff &lt;0f&gt; 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90
[  +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282
[  +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:
0000000000000027
[  +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:
ffff94d47f620bc0
[  +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:
00000000ffff7fff
[  +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:
ffff94c5451ea180
[  +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:
ffff94c5f1330ab0
[  +0.000001] FS:  0000000000000000(0000) GS:ffff94d47f600000(0000)
knlGS:0000000000000000
[  +0.000002] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:
00000000007706f0
[  +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[  +0.000001] PKRU: 55555554
[  +0.000001] Call Trace:
[  +0.000001]  &lt;TASK&gt;
[  +0.000002]  ? __warn+0x80/0x130
[  +0.000003]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  ? report_bug+0x195/0x1a0
[  +0.000005]  ? handle_bug+0x3c/0x70
[  +0.000003]  ? exc_invalid_op+0x14/0x70
[  +0.000002]  ? asm_exc_invalid_op+0x16/0x20
[  +0.000006]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  __flush_workqueue+0x126/0x3f0
[  +0.000015]  ib_cache_cleanup_one+0x1c/0xe0 [ib_core]
[  +0.000056]  __ib_unregister_device+0x6a/0xb0 [ib_core]
[  +0.000023]  ib_unregister_device_and_put+0x34/0x50 [ib_core]
[  +0.000020]  i40iw_close+0x4b/0x90 [irdma]
[  +0.000022]  i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e]
[  +0.000035]  i40e_service_task+0x126/0x190 [i40e]
[  +0.000024]  process_one_work+0x174/0x340
[  +0.000003]  worker_th
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224545">SUSE bug 1224545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36005</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: honor table dormant flag from netdev release event path

Check for table dormant flag otherwise netdev release event path tries
to unregister an already unregistered hook.

[524854.857999] ------------[ cut here ]------------
[524854.858010] WARNING: CPU: 0 PID: 3386599 at net/netfilter/core.c:501 __nf_unregister_net_hook+0x21a/0x260
[...]
[524854.858848] CPU: 0 PID: 3386599 Comm: kworker/u32:2 Not tainted 6.9.0-rc3+ #365
[524854.858869] Workqueue: netns cleanup_net
[524854.858886] RIP: 0010:__nf_unregister_net_hook+0x21a/0x260
[524854.858903] Code: 24 e8 aa 73 83 ff 48 63 43 1c 83 f8 01 0f 85 3d ff ff ff e8 98 d1 f0 ff 48 8b 3c 24 e8 8f 73 83 ff 48 63 43 1c e9 26 ff ff ff &lt;0f&gt; 0b 48 83 c4 18 48 c7 c7 00 68 e9 82 5b 5d 41 5c 41 5d 41 5e 41
[524854.858914] RSP: 0018:ffff8881e36d79e0 EFLAGS: 00010246
[524854.858926] RAX: 0000000000000000 RBX: ffff8881339ae790 RCX: ffffffff81ba524a
[524854.858936] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881c8a16438
[524854.858945] RBP: ffff8881c8a16438 R08: 0000000000000001 R09: ffffed103c6daf34
[524854.858954] R10: ffff8881e36d79a7 R11: 0000000000000000 R12: 0000000000000005
[524854.858962] R13: ffff8881c8a16000 R14: 0000000000000000 R15: ffff8881351b5a00
[524854.858971] FS:  0000000000000000(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[524854.858982] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[524854.858991] CR2: 00007fc9be0f16f4 CR3: 00000001437cc004 CR4: 00000000001706f0
[524854.859000] Call Trace:
[524854.859006]  &lt;TASK&gt;
[524854.859013]  ? __warn+0x9f/0x1a0
[524854.859027]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859044]  ? report_bug+0x1b1/0x1e0
[524854.859060]  ? handle_bug+0x3c/0x70
[524854.859071]  ? exc_invalid_op+0x17/0x40
[524854.859083]  ? asm_exc_invalid_op+0x1a/0x20
[524854.859100]  ? __nf_unregister_net_hook+0x6a/0x260
[524854.859116]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859135]  nf_tables_netdev_event+0x337/0x390 [nf_tables]
[524854.859304]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859461]  ? packet_notifier+0xb3/0x360
[524854.859476]  ? _raw_spin_unlock_irqrestore+0x11/0x40
[524854.859489]  ? dcbnl_netdevice_event+0x35/0x140
[524854.859507]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859661]  notifier_call_chain+0x7d/0x140
[524854.859677]  unregister_netdevice_many_notify+0x5e1/0xae0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224539">SUSE bug 1224539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix incorrect list API usage

Both the function that migrates all the chunks within a region and the
function that migrates all the entries within a chunk call
list_first_entry() on the respective lists without checking that the
lists are not empty. This is incorrect usage of the API, which leads to
the following warning [1].

Fix by returning if the lists are empty as there is nothing to migrate
in this case.

[1]
WARNING: CPU: 0 PID: 6437 at drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:1266 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0&gt;
Modules linked in:
CPU: 0 PID: 6437 Comm: kworker/0:37 Not tainted 6.9.0-rc3-custom-00883-g94a65f079ef6 #39
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0x2c0
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x4a0
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224541">SUSE bug 1224541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix warning during rehash

As previously explained, the rehash delayed work migrates filters from
one region to another. This is done by iterating over all chunks (all
the filters with the same priority) in the region and in each chunk
iterating over all the filters.

When the work runs out of credits it stores the current chunk and entry
as markers in the per-work context so that it would know where to resume
the migration from the next time the work is scheduled.

Upon error, the chunk marker is reset to NULL, but without resetting the
entry markers despite being relative to it. This can result in migration
being resumed from an entry that does not belong to the chunk being
migrated. In turn, this will eventually lead to a chunk being iterated
over as if it is an entry. Because of how the two structures happen to
be defined, this does not lead to KASAN splats, but to warnings such as
[1].

Fix by creating a helper that resets all the markers and call it from
all the places the currently only reset the chunk marker. For good
measures also call it when starting a completely new rehash. Add a
warning to avoid future cases.

[1]
WARNING: CPU: 7 PID: 1076 at drivers/net/ethernet/mellanox/mlxsw/core_acl_flex_keys.c:407 mlxsw_afk_encode+0x242/0x2f0
Modules linked in:
CPU: 7 PID: 1076 Comm: kworker/7:24 Tainted: G        W          6.9.0-rc3-custom-00880-g29e61d91b77b #29
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_afk_encode+0x242/0x2f0
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_entry_add+0xd9/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x109/0x290
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x470
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224543">SUSE bug 1224543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: check for NULL idev in ip_route_use_hint()

syzbot was able to trigger a NULL deref in fib_validate_source()
in an old tree [1].

It appears the bug exists in latest trees.

All calls to __in_dev_get_rcu() must be checked for a NULL result.

[1]
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 2 PID: 3257 Comm: syz-executor.3 Not tainted 5.10.0-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
 RIP: 0010:fib_validate_source+0xbf/0x15a0 net/ipv4/fib_frontend.c:425
Code: 18 f2 f2 f2 f2 42 c7 44 20 23 f3 f3 f3 f3 48 89 44 24 78 42 c6 44 20 27 f3 e8 5d 88 48 fc 4c 89 e8 48 c1 e8 03 48 89 44 24 18 &lt;42&gt; 80 3c 20 00 74 08 4c 89 ef e8 d2 15 98 fc 48 89 5c 24 10 41 bf
RSP: 0018:ffffc900015fee40 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88800f7a4000 RCX: ffff88800f4f90c0
RDX: 0000000000000000 RSI: 0000000004001eac RDI: ffff8880160c64c0
RBP: ffffc900015ff060 R08: 0000000000000000 R09: ffff88800f7a4000
R10: 0000000000000002 R11: ffff88800f4f90c0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ffff88800f7a4000
FS:  00007f938acfe6c0(0000) GS:ffff888058c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f938acddd58 CR3: 000000001248e000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
  ip_route_use_hint+0x410/0x9b0 net/ipv4/route.c:2231
  ip_rcv_finish_core+0x2c4/0x1a30 net/ipv4/ip_input.c:327
  ip_list_rcv_finish net/ipv4/ip_input.c:612 [inline]
  ip_sublist_rcv+0x3ed/0xe50 net/ipv4/ip_input.c:638
  ip_list_rcv+0x422/0x470 net/ipv4/ip_input.c:673
  __netif_receive_skb_list_ptype net/core/dev.c:5572 [inline]
  __netif_receive_skb_list_core+0x6b1/0x890 net/core/dev.c:5620
  __netif_receive_skb_list net/core/dev.c:5672 [inline]
  netif_receive_skb_list_internal+0x9f9/0xdc0 net/core/dev.c:5764
  netif_receive_skb_list+0x55/0x3e0 net/core/dev.c:5816
  xdp_recv_frames net/bpf/test_run.c:257 [inline]
  xdp_test_run_batch net/bpf/test_run.c:335 [inline]
  bpf_test_run_xdp_live+0x1818/0x1d00 net/bpf/test_run.c:363
  bpf_prog_test_run_xdp+0x81f/0x1170 net/bpf/test_run.c:1376
  bpf_prog_test_run+0x349/0x3c0 kernel/bpf/syscall.c:3736
  __sys_bpf+0x45c/0x710 kernel/bpf/syscall.c:5115
  __do_sys_bpf kernel/bpf/syscall.c:5201 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:5199 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5199
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224540">SUSE bug 1224540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36009</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix netdev refcount issue

The dev_tracker is added to ax25_cb in ax25_bind(). When the
ax25 device is detaching, the dev_tracker of ax25_cb should be
deallocated in ax25_kill_by_device() instead of the dev_tracker
of ax25_dev. The log reported by ref_tracker is shown below:

[   80.884935] ref_tracker: reference already released.
[   80.885150] ref_tracker: allocated in:
[   80.885349]  ax25_dev_device_up+0x105/0x540
[   80.885730]  ax25_device_event+0xa4/0x420
[   80.885730]  notifier_call_chain+0xc9/0x1e0
[   80.885730]  __dev_notify_flags+0x138/0x280
[   80.885730]  dev_change_flags+0xd7/0x180
[   80.885730]  dev_ifsioc+0x6a9/0xa30
[   80.885730]  dev_ioctl+0x4d8/0xd90
[   80.885730]  sock_do_ioctl+0x1c2/0x2d0
[   80.885730]  sock_ioctl+0x38b/0x4f0
[   80.885730]  __se_sys_ioctl+0xad/0xf0
[   80.885730]  do_syscall_64+0xc4/0x1b0
[   80.885730]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   80.885730] ref_tracker: freed in:
[   80.885730]  ax25_device_event+0x272/0x420
[   80.885730]  notifier_call_chain+0xc9/0x1e0
[   80.885730]  dev_close_many+0x272/0x370
[   80.885730]  unregister_netdevice_many_notify+0x3b5/0x1180
[   80.885730]  unregister_netdev+0xcf/0x120
[   80.885730]  sixpack_close+0x11f/0x1b0
[   80.885730]  tty_ldisc_kill+0xcb/0x190
[   80.885730]  tty_ldisc_hangup+0x338/0x3d0
[   80.885730]  __tty_hangup+0x504/0x740
[   80.885730]  tty_release+0x46e/0xd80
[   80.885730]  __fput+0x37f/0x770
[   80.885730]  __x64_sys_close+0x7b/0xb0
[   80.885730]  do_syscall_64+0xc4/0x1b0
[   80.885730]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   80.893739] ------------[ cut here ]------------
[   80.894030] WARNING: CPU: 2 PID: 140 at lib/ref_tracker.c:255 ref_tracker_free+0x47b/0x6b0
[   80.894297] Modules linked in:
[   80.894929] CPU: 2 PID: 140 Comm: ax25_conn_rel_6 Not tainted 6.9.0-rc4-g8cd26fd90c1a #11
[   80.895190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qem4
[   80.895514] RIP: 0010:ref_tracker_free+0x47b/0x6b0
[   80.895808] Code: 83 c5 18 4c 89 eb 48 c1 eb 03 8a 04 13 84 c0 0f 85 df 01 00 00 41 83 7d 00 00 75 4b 4c 89 ff 9
[   80.896171] RSP: 0018:ffff888009edf8c0 EFLAGS: 00000286
[   80.896339] RAX: 1ffff1100141ac00 RBX: 1ffff1100149463b RCX: dffffc0000000000
[   80.896502] RDX: 0000000000000001 RSI: 0000000000000246 RDI: ffff88800a0d6518
[   80.896925] RBP: ffff888009edf9b0 R08: ffff88806d3288d3 R09: 1ffff1100da6511a
[   80.897212] R10: dffffc0000000000 R11: ffffed100da6511b R12: ffff88800a4a31d4
[   80.897859] R13: ffff88800a4a31d8 R14: dffffc0000000000 R15: ffff88800a0d6518
[   80.898279] FS:  00007fd88b7fe700(0000) GS:ffff88806d300000(0000) knlGS:0000000000000000
[   80.899436] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   80.900181] CR2: 00007fd88c001d48 CR3: 000000000993e000 CR4: 00000000000006f0
...
[   80.935774] ref_tracker: sp%d@000000000bb9df3d has 1/1 users at
[   80.935774]      ax25_bind+0x424/0x4e0
[   80.935774]      __sys_bind+0x1d9/0x270
[   80.935774]      __x64_sys_bind+0x75/0x80
[   80.935774]      do_syscall_64+0xc4/0x1b0
[   80.935774]      entry_SYSCALL_64_after_hwframe+0x67/0x6f

Change ax25_dev-&gt;dev_tracker to the dev_tracker of ax25_cb
in order to mitigate the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224542">SUSE bug 1224542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36012</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: msft: fix slab-use-after-free in msft_do_close()

Tying the msft-&gt;data lifetime to hdev by freeing it in
hci_release_dev() to fix the following case:

[use]
msft_do_close()
  msft = hdev-&gt;msft_data;
  if (!msft)                      ...(1) &lt;- passed.
    return;
  mutex_lock(&amp;msft-&gt;filter_lock); ...(4) &lt;- used after freed.

[free]
msft_unregister()
  msft = hdev-&gt;msft_data;
  hdev-&gt;msft_data = NULL;         ...(2)
  kfree(msft);                    ...(3) &lt;- msft is freed.

==================================================================
BUG: KASAN: slab-use-after-free in __mutex_lock_common
kernel/locking/mutex.c:587 [inline]
BUG: KASAN: slab-use-after-free in __mutex_lock+0x8f/0xc30
kernel/locking/mutex.c:752
Read of size 8 at addr ffff888106cbbca8 by task kworker/u5:2/309
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225502">SUSE bug 1225502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36013</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()

Extend a critical section to prevent chan from early freeing.
Also make the l2cap_connect() return type void. Nothing is using the
returned value but it is ugly to return a potentially freed pointer.
Making it void will help with backports because earlier kernels did use
the return value. Now the compile will break for kernels where this
patch is not a complete fix.

Call stack summary:

[use]
l2cap_bredr_sig_cmd
  l2cap_connect
    mutex_lock(&amp;conn-&gt;chan_lock);
  | chan = pchan-&gt;ops-&gt;new_connection(pchan); &lt;- alloc chan
  | __l2cap_chan_add(conn, chan);
  |   l2cap_chan_hold(chan);
  |   list_add(&amp;chan-&gt;list, &amp;conn-&gt;chan_l);   ... (1)
    mutex_unlock(&amp;conn-&gt;chan_lock);
    chan-&gt;conf_state              ... (4) &lt;- use after free

[free]
l2cap_conn_del
  mutex_lock(&amp;conn-&gt;chan_lock);
| foreach chan in conn-&gt;chan_l:            ... (2)
|   l2cap_chan_put(chan);
|     l2cap_chan_destroy
|       kfree(chan)               ... (3) &lt;- chan freed
  mutex_unlock(&amp;conn-&gt;chan_lock);

==================================================================
BUG: KASAN: slab-use-after-free in instrument_atomic_read
include/linux/instrumented.h:68 [inline]
BUG: KASAN: slab-use-after-free in _test_bit
include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
BUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0
net/bluetooth/l2cap_core.c:4260
Read of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225578">SUSE bug 1225578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36014</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/arm/malidp: fix a possible null pointer dereference

In malidp_mw_connector_reset, new memory is allocated with kzalloc, but
no check is performed. In order to prevent null pointer dereferencing,
ensure that mw_state is checked before calling
__drm_atomic_helper_connector_reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225593">SUSE bug 1225593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36015</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppdev: Add an error check in register_device

In register_device, the return value of ida_simple_get is unchecked,
in witch ida_simple_get will use an invalid index value.

To address this issue, index should be checked after ida_simple_get. When
the index value is abnormal, a warning message should be printed, the port
should be dropped, and the value should be recorded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225640">SUSE bug 1225640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix possible out-of-bounds in gsm0_receive()

Assuming the following:
- side A configures the n_gsm in basic option mode
- side B sends the header of a basic option mode frame with data length 1
- side A switches to advanced option mode
- side B sends 2 data bytes which exceeds gsm-&gt;len
  Reason: gsm-&gt;len is not used in advanced option mode.
- side A switches to basic option mode
- side B keeps sending until gsm0_receive() writes past gsm-&gt;buf
  Reason: Neither gsm-&gt;state nor gsm-&gt;len have been reset after
  reconfiguration.

Fix this by changing gsm-&gt;count to gsm-&gt;len comparison from equal to less
than. Also add upper limit checks against the constant MAX_MRU in
gsm0_receive() and gsm1_receive() to harden against memory corruption of
gsm-&gt;len and gsm-&gt;mru.

All other checks remain as we still need to limit the data according to the
user configuration and actual payload size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225642">SUSE bug 1225642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36017</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation

Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a
struct ifla_vf_vlan_info so the size of such attribute needs to be at least
of sizeof(struct ifla_vf_vlan_info) which is 14 bytes.
The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)
which is less than sizeof(struct ifla_vf_vlan_info) so this validation
is not enough and a too small attribute might be cast to a
struct ifla_vf_vlan_info, this might result in an out of bands
read access when accessing the saved (casted) entry in ivvl.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225681">SUSE bug 1225681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36020</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix vf may be used uninitialized in this function warning

To fix the regression introduced by commit 52424f974bc5, which causes
servers hang in very hard to reproduce conditions with resets races.
Using two sources for the information is the root cause.
In this function before the fix bumping v didn't mean bumping vf
pointer. But the code used this variables interchangeably, so stale vf
could point to different/not intended vf.

Remove redundant "v" variable and iterate via single VF pointer across
whole function instead to guarantee VF pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225698">SUSE bug 1225698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36021</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when devlink reload during pf initialization

The devlink reload process will access the hardware resources,
but the register operation is done before the hardware is initialized.
So, processing the devlink reload during initialization may lead to kernel
crash. This patch fixes this by taking devl_lock during initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225699">SUSE bug 1225699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36025</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()

The app_reply-&gt;elem[] array is allocated earlier in this function and it
has app_req.num_ports elements.  Thus this &gt; comparison needs to be &gt;= to
prevent memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225704">SUSE bug 1225704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36026</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11

While doing multiple S4 stress tests, GC/RLC/PMFW get into
an invalid state resulting into hard hangs.

Adding a GFX reset as workaround just before sending the
MP1_UNLOAD message avoids this failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225705">SUSE bug 1225705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36029</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci-msm: pervent access to suspended controller

Generic sdhci code registers LED device and uses host-&gt;runtime_suspended
flag to protect access to it. The sdhci-msm driver doesn't set this flag,
which causes a crash when LED is accessed while controller is runtime
suspended. Fix this by setting the flag correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225708">SUSE bug 1225708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36032</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix info leak when fetching fw build id

Add the missing sanity checks and move the 255-byte build-id buffer off
the stack to avoid leaking stack data through debugfs in case the
build-info reply is malformed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225720">SUSE bug 1225720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36244</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: extend minimum interval restriction to entire cycle too

It is possible for syzbot to side-step the restriction imposed by the
blamed commit in the Fixes: tag, because the taprio UAPI permits a
cycle-time different from (and potentially shorter than) the sum of
entry intervals.

We need one more restriction, which is that the cycle time itself must
be larger than N * ETH_ZLEN bit times, where N is the number of schedule
entries. This restriction needs to apply regardless of whether the cycle
time came from the user or was the implicit, auto-calculated value, so
we move the existing "cycle == 0" check outside the "if "(!new-&gt;cycle_time)"
branch. This way covers both conditions and scenarios.

Add a selftest which illustrates the issue triggered by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226797">SUSE bug 1226797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36270</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: tproxy: bail out if IP has been disabled on the device

syzbot reports:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
[..]
RIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62
Call Trace:
 nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline]
 nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168

__in_dev_get_rcu() can return NULL, so check for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226798">SUSE bug 1226798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36286</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()

syzbot reported that nf_reinject() could be called without rcu_read_lock() :

WARNING: suspicious RCU usage
6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0 Not tainted

net/netfilter/nfnetlink_queue.c:263 suspicious rcu_dereference_check() usage!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-executor.4/13427:
  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2190 [inline]
  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_core+0xa86/0x1830 kernel/rcu/tree.c:2471
  #1: ffff88801ca92958 (&amp;inst-&gt;lock){+.-.}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
  #1: ffff88801ca92958 (&amp;inst-&gt;lock){+.-.}-{2:2}, at: nfqnl_flush net/netfilter/nfnetlink_queue.c:405 [inline]
  #1: ffff88801ca92958 (&amp;inst-&gt;lock){+.-.}-{2:2}, at: instance_destroy_rcu+0x30/0x220 net/netfilter/nfnetlink_queue.c:172

stack backtrace:
CPU: 0 PID: 13427 Comm: syz-executor.4 Not tainted 6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Call Trace:
 &lt;IRQ&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712
  nf_reinject net/netfilter/nfnetlink_queue.c:323 [inline]
  nfqnl_reinject+0x6ec/0x1120 net/netfilter/nfnetlink_queue.c:397
  nfqnl_flush net/netfilter/nfnetlink_queue.c:410 [inline]
  instance_destroy_rcu+0x1ae/0x220 net/netfilter/nfnetlink_queue.c:172
  rcu_do_batch kernel/rcu/tree.c:2196 [inline]
  rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471
  handle_softirqs+0x2d6/0x990 kernel/softirq.c:554
  __do_softirq kernel/softirq.c:588 [inline]
  invoke_softirq kernel/softirq.c:428 [inline]
  __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:649
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
 &lt;/IRQ&gt;
 &lt;TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226801">SUSE bug 1226801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix loop termination condition in gss_free_in_token_pages()

The in_token-&gt;pages[] array is not NULL terminated. This results in
the following KASAN splat:

  KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226834">SUSE bug 1226834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36477</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36477" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer

The TPM SPI transfer mechanism uses MAX_SPI_FRAMESIZE for computing the
maximum transfer length and the size of the transfer buffer. As such, it
does not account for the 4 bytes of header that prepends the SPI data
frame. This can result in out-of-bounds accesses and was confirmed with
KASAN.

Introduce SPI_HDRSIZE to account for the header and use to allocate the
transfer buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226840">SUSE bug 1226840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36478</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36478" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'

Writing 'power' and 'submit_queues' concurrently will trigger kernel
panic:

Test script:

modprobe null_blk nr_devices=0
mkdir -p /sys/kernel/config/nullb/nullb0
while true; do echo 1 &gt; submit_queues; echo 4 &gt; submit_queues; done &amp;
while true; do echo 1 &gt; power; echo 0 &gt; power; done

Test result:

BUG: kernel NULL pointer dereference, address: 0000000000000148
Oops: 0000 [#1] PREEMPT SMP
RIP: 0010:__lock_acquire+0x41d/0x28f0
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0x121/0x450
 down_write+0x5f/0x1d0
 simple_recursive_removal+0x12f/0x5c0
 blk_mq_debugfs_unregister_hctxs+0x7c/0x100
 blk_mq_update_nr_hw_queues+0x4a3/0x720
 nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
 nullb_device_submit_queues_store+0x79/0xf0 [null_blk]
 configfs_write_iter+0x119/0x1e0
 vfs_write+0x326/0x730
 ksys_write+0x74/0x150

This is because del_gendisk() can concurrent with
blk_mq_update_nr_hw_queues():

nullb_device_power_store	nullb_apply_submit_queues
 null_del_dev
 del_gendisk
				 nullb_update_nr_hw_queues
				  if (!dev-&gt;nullb)
				  // still set while gendisk is deleted
				   return 0
				  blk_mq_update_nr_hw_queues
 dev-&gt;nullb = NULL

Fix this problem by resuing the global mutex to protect
nullb_device_power_store() and nullb_update_nr_hw_queues() from configfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226841">SUSE bug 1226841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36479</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36479" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: bridge: add owner module and take its refcount

The current implementation of the fpga bridge assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the bridge if
the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_bridge
struct and use it to take the module's refcount. Modify the function for
registering a bridge to take an additional owner module parameter and
rename it to avoid conflicts. Use the old function name for a helper macro
that automatically sets the module that registers the bridge as the owner.
This ensures compatibility with existing low-level control modules and
reduces the chances of registering a bridge without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga bridge.

Other changes: opportunistically move put_device() from __fpga_bridge_get()
to fpga_bridge_get() and of_fpga_bridge_get() to improve code clarity since
the bridge device is taken in these functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226949">SUSE bug 1226949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36484</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36484" ref_url="https://www.suse.com/security/cve/CVE-2024-36484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: relax socket state check at accept time.

Christoph reported the following splat:

WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0
Modules linked in:
CPU: 1 PID: 772 Comm: syz-executor510 Not tainted 6.9.0-rc7-g7da7119fe22b #56
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
RIP: 0010:__inet_accept+0x1f4/0x4a0 net/ipv4/af_inet.c:759
Code: 04 38 84 c0 0f 85 87 00 00 00 41 c7 04 24 03 00 00 00 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ec b7 da fd &lt;0f&gt; 0b e9 7f fe ff ff e8 e0 b7 da fd 0f 0b e9 fe fe ff ff 89 d9 80
RSP: 0018:ffffc90000c2fc58 EFLAGS: 00010293
RAX: ffffffff836bdd14 RBX: 0000000000000000 RCX: ffff888104668000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff836bdb89 R09: fffff52000185f64
R10: dffffc0000000000 R11: fffff52000185f64 R12: dffffc0000000000
R13: 1ffff92000185f98 R14: ffff88810754d880 R15: ffff8881007b7800
FS:  000000001c772880(0000) GS:ffff88811b280000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb9fcf2e178 CR3: 00000001045d2002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 inet_accept+0x138/0x1d0 net/ipv4/af_inet.c:786
 do_accept+0x435/0x620 net/socket.c:1929
 __sys_accept4_file net/socket.c:1969 [inline]
 __sys_accept4+0x9b/0x110 net/socket.c:1999
 __do_sys_accept net/socket.c:2016 [inline]
 __se_sys_accept net/socket.c:2013 [inline]
 __x64_sys_accept+0x7d/0x90 net/socket.c:2013
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x58/0x100 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x4315f9
Code: fd ff 48 81 c4 80 00 00 00 e9 f1 fe ff ff 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 0f 83 ab b4 fd ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb26d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 0000000000400300 RCX: 00000000004315f9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
RBP: 00000000006e1018 R08: 0000000000400300 R09: 0000000000400300
R10: 0000000000400300 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000040cdf0 R14: 000000000040ce80 R15: 0000000000000055
 &lt;/TASK&gt;

The reproducer invokes shutdown() before entering the listener status.
After commit 94062790aedb ("tcp: defer shutdown(SEND_SHUTDOWN) for
TCP_SYN_RECV sockets"), the above causes the child to reach the accept
syscall in FIN_WAIT1 status.

Eric noted we can relax the existing assertion in __inet_accept()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36484/">CVE-2024-36484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226872">SUSE bug 1226872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36489</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix missing memory barrier in tls_init

In tls_init(), a write memory barrier is missing, and store-store
reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.

CPU0                               CPU1
-----                              -----
// In tls_init()
// In tls_ctx_create()
ctx = kzalloc()
ctx-&gt;sk_proto = READ_ONCE(sk-&gt;sk_prot) -(1)

// In update_sk_prot()
WRITE_ONCE(sk-&gt;sk_prot, tls_prots)     -(2)

                                   // In sock_common_setsockopt()
                                   READ_ONCE(sk-&gt;sk_prot)-&gt;setsockopt()

                                   // In tls_{setsockopt,getsockopt}()
                                   ctx-&gt;sk_proto-&gt;setsockopt()    -(3)

In the above scenario, when (1) and (2) are reordered, (3) can observe
the NULL value of ctx-&gt;sk_proto, causing NULL dereference.

To fix it, we rely on rcu_assign_pointer() which implies the release
barrier semantic. By moving rcu_assign_pointer() after ctx-&gt;sk_proto is
initialized, we can ensure that ctx-&gt;sk_proto are visible when
changing sk-&gt;sk_prot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226874">SUSE bug 1226874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3651</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8365" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1939-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009857793" comment="python3-idna-2.6-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857795" comment="python3-idna is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36880</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: add missing firmware sanity checks

Add the missing sanity checks when parsing the firmware files before
downloading them to avoid accessing and corrupting memory beyond the
vmalloced buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225722">SUSE bug 1225722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36883</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix out-of-bounds access in ops_init

net_alloc_generic is called by net_alloc, which is called without any
locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It
is read twice, first to allocate an array, then to set s.len, which is
later used to limit the bounds of the array access.

It is possible that the array is allocated and another thread is
registering a new pernet ops, increments max_gen_ptrs, which is then used
to set s.len with a larger than allocated length for the variable array.

Fix it by reading max_gen_ptrs only once in net_alloc_generic. If
max_gen_ptrs is later incremented, it will be caught in net_assign_generic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225725">SUSE bug 1225725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36886</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix UAF in error path

Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported
a UAF in the tipc_buf_append() error path:

BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0
linux/net/core/skbuff.c:1183
Read of size 8 at addr ffff88804d2a7c80 by task poc/8034

CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.0-debian-1.16.0-5 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 __dump_stack linux/lib/dump_stack.c:88
 dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106
 print_address_description linux/mm/kasan/report.c:377
 print_report+0xc4/0x620 linux/mm/kasan/report.c:488
 kasan_report+0xda/0x110 linux/mm/kasan/report.c:601
 kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183
 skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026
 skb_release_all linux/net/core/skbuff.c:1094
 __kfree_skb linux/net/core/skbuff.c:1108
 kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144
 kfree_skb linux/./include/linux/skbuff.h:1244
 tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186
 tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324
 tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824
 tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159
 tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390
 udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108
 udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186
 udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346
 __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422
 ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205
 ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254
 dst_input linux/./include/net/dst.h:461
 ip_rcv_finish linux/net/ipv4/ip_input.c:449
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534
 __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648
 process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976
 __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576
 napi_poll linux/net/core/dev.c:6645
 net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781
 __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553
 do_softirq linux/kernel/softirq.c:454
 do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381
 local_bh_enable linux/./include/linux/bottom_half.h:33
 rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851
 __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378
 dev_queue_xmit linux/./include/linux/netdevice.h:3169
 neigh_hh_output linux/./include/net/neighbour.h:526
 neigh_output linux/./include/net/neighbour.h:540
 ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235
 __ip_finish_output linux/net/ipv4/ip_output.c:313
 __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323
 NF_HOOK_COND linux/./include/linux/netfilter.h:303
 ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433
 dst_output linux/./include/net/dst.h:451
 ip_local_out linux/net/ipv4/ip_output.c:129
 ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492
 udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963
 udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250
 inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850
 sock_sendmsg_nosec linux/net/socket.c:730
 __sock_sendmsg linux/net/socket.c:745
 __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191
 __do_sys_sendto linux/net/socket.c:2203
 __se_sys_sendto linux/net/socket.c:2199
 __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199
 do_syscall_x64 linux/arch/x86/entry/common.c:52
 do_syscall_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225730">SUSE bug 1225730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_nxt is properly initialized on connect

Christoph reported a splat hinting at a corrupted snd_una:

  WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
  Modules linked in:
  CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
  Workqueue: events mptcp_worker
  RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
  Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8
  	8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe
  	&lt;0f&gt; 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9
  RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293
  RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4
  RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001
  RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
  R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000
  R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000
  FS:  0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0
  Call Trace:
   &lt;TASK&gt;
   __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]
   mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]
   __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615
   mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767
   process_one_work+0x1e0/0x560 kernel/workqueue.c:3254
   process_scheduled_works kernel/workqueue.c:3335 [inline]
   worker_thread+0x3c7/0x640 kernel/workqueue.c:3416
   kthread+0x121/0x170 kernel/kthread.c:388
   ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
   &lt;/TASK&gt;

When fallback to TCP happens early on a client socket, snd_nxt
is not yet initialized and any incoming ack will copy such value
into snd_una. If the mptcp worker (dumbly) tries mptcp-level
re-injection after such ack, that would unconditionally trigger a send
buffer cleanup using 'bad' snd_una values.

We could easily disable re-injection for fallback sockets, but such
dumb behavior already helped catching a few subtle issues and a very
low to zero impact in practice.

Instead address the issue always initializing snd_nxt (and write_seq,
for consistency) at connect time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225746">SUSE bug 1225746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36890</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slab: make __free(kfree) accept error pointers

Currently, if an automatically freed allocation is an error pointer that
will lead to a crash.  An example of this is in wm831x_gpio_dbg_show().

   171	char *label __free(kfree) = gpiochip_dup_line_label(chip, i);
   172	if (IS_ERR(label)) {
   173		dev_err(wm831x-&gt;dev, "Failed to duplicate label\n");
   174		continue;
   175  }

The auto clean up function should check for error pointers as well,
otherwise we're going to keep hitting issues like this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225714">SUSE bug 1225714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36893</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Check for port partner validity before consuming it

typec_register_partner() does not guarantee partner registration
to always succeed. In the event of failure, port-&gt;partner is set
to the error value or NULL. Given that port-&gt;partner validity is
not checked, this results in the following crash:

Unable to handle kernel NULL pointer dereference at virtual address xx
 pc : run_state_machine+0x1bc8/0x1c08
 lr : run_state_machine+0x1b90/0x1c08
..
 Call trace:
   run_state_machine+0x1bc8/0x1c08
   tcpm_state_machine_work+0x94/0xe4
   kthread_worker_fn+0x118/0x328
   kthread+0x1d0/0x23c
   ret_from_fork+0x10/0x20

To prevent the crash, check for port-&gt;partner validity before
derefencing it in all the call sites.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225748">SUSE bug 1225748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36894</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete

FFS based applications can utilize the aio_cancel() callback to dequeue
pending USB requests submitted to the UDC.  There is a scenario where the
FFS application issues an AIO cancel call, while the UDC is handling a
soft disconnect.  For a DWC3 based implementation, the callstack looks
like the following:

    DWC3 Gadget                               FFS Application
dwc3_gadget_soft_disconnect()              ...
  --&gt; dwc3_stop_active_transfers()
    --&gt; dwc3_gadget_giveback(-ESHUTDOWN)
      --&gt; ffs_epfile_async_io_complete()   ffs_aio_cancel()
        --&gt; usb_ep_free_request()            --&gt; usb_ep_dequeue()

There is currently no locking implemented between the AIO completion
handler and AIO cancel, so the issue occurs if the completion routine is
running in parallel to an AIO cancel call coming from the FFS application.
As the completion call frees the USB request (io_data-&gt;req) the FFS
application is also referencing it for the usb_ep_dequeue() call.  This can
lead to accessing a stale/hanging pointer.

commit b566d38857fc ("usb: gadget: f_fs: use io_data-&gt;status consistently")
relocated the usb_ep_free_request() into ffs_epfile_async_io_complete().
However, in order to properly implement locking to mitigate this issue, the
spinlock can't be added to ffs_epfile_async_io_complete(), as
usb_ep_dequeue() (if successfully dequeuing a USB request) will call the
function driver's completion handler in the same context.  Hence, leading
into a deadlock.

Fix this issue by moving the usb_ep_free_request() back to
ffs_user_copy_worker(), and ensuring that it explicitly sets io_data-&gt;req
to NULL after freeing it within the ffs-&gt;eps_lock.  This resolves the race
condition above, as the ffs_aio_cancel() routine will not continue
attempting to dequeue a request that has already been freed, or the
ffs_user_copy_work() not freeing the USB request until the AIO cancel is
done referencing it.

This fix depends on
  commit b566d38857fc ("usb: gadget: f_fs: use io_data-&gt;status
  consistently")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226139">SUSE bug 1226139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix access violation during port device removal

Testing with KASAN and syzkaller revealed a bug in port.c:disable_store():
usb_hub_to_struct_hub() can return NULL if the hub that the port belongs to
is concurrently removed, but the function does not check for this
possibility before dereferencing the returned value.

It turns out that the first dereference is unnecessary, since hub-&gt;intfdev
is the parent of the port device, so it can be changed easily.  Adding a
check for hub == NULL prevents further problems.

The same bug exists in the disable_show() routine, and it can be fixed the
same way.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225734">SUSE bug 1225734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Atom Integrated System Info v2_2 for DCN35

New request from KMD/VBIOS in order to support new UMA carveout
model. This fixes a null dereference from accessing
Ctx-&gt;dc_bios-&gt;integrated_info while it was NULL.

DAL parses through the BIOS and extracts the necessary
integrated_info but was missing a case for the new BIOS
version 2.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225735">SUSE bug 1225735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Fix use after free in lineinfo_changed_notify

The use-after-free issue occurs as follows: when the GPIO chip device file
is being closed by invoking gpio_chrdev_release(), watched_lines is freed
by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier
chain failed due to waiting write rwsem. Additionally, one of the GPIO
chip's lines is also in the release process and holds the notifier chain's
read rwsem. Consequently, a race condition leads to the use-after-free of
watched_lines.

Here is the typical stack when issue happened:

[free]
gpio_chrdev_release()
  --&gt; bitmap_free(cdev-&gt;watched_lines)                  &lt;-- freed
  --&gt; blocking_notifier_chain_unregister()
    --&gt; down_write(&amp;nh-&gt;rwsem)                          &lt;-- waiting rwsem
          --&gt; __down_write_common()
            --&gt; rwsem_down_write_slowpath()
                  --&gt; schedule_preempt_disabled()
                    --&gt; schedule()

[use]
st54spi_gpio_dev_release()
  --&gt; gpio_free()
    --&gt; gpiod_free()
      --&gt; gpiod_free_commit()
        --&gt; gpiod_line_state_notify()
          --&gt; blocking_notifier_call_chain()
            --&gt; down_read(&amp;nh-&gt;rwsem);                  &lt;-- held rwsem
            --&gt; notifier_call_chain()
              --&gt; lineinfo_changed_notify()
                --&gt; test_bit(xxxx, cdev-&gt;watched_lines) &lt;-- use after free

The side effect of the use-after-free issue is that a GPIO line event is
being generated for userspace where it shouldn't. However, since the chrdev
is being closed, userspace won't have the chance to read that event anyway.

To fix the issue, call the bitmap_free() function after the unregistration
of lineinfo_changed_nb notifier chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225739">SUSE bug 1225739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when devlink reload during initialization

The devlink reload process will access the hardware resources,
but the register operation is done before the hardware is initialized.
So, processing the devlink reload during initialization may lead to kernel
crash.

This patch fixes this by registering the devlink after
hardware initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225726">SUSE bug 1225726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent NULL dereference in ip6_output()

According to syzbot, there is a chance that ip6_dst_idev()
returns NULL in ip6_output(). Most places in IPv6 stack
deal with a NULL idev just fine, but not here.

syzbot reported:

general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]
CPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237
Code: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff
RSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202
RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000
RDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48
RBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad
R10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0
R13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000
FS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358
  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248
  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653
  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783
  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]
  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212
  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]
  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169
  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73
  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234
  sctp_connect net/sctp/socket.c:4819 [inline]
  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834
  __sys_connect_file net/socket.c:2048 [inline]
  __sys_connect+0x2df/0x310 net/socket.c:2065
  __do_sys_connect net/socket.c:2075 [inline]
  __se_sys_connect net/socket.c:2072 [inline]
  __x64_sys_connect+0x7a/0x90 net/socket.c:2072
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225711">SUSE bug 1225711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36902</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()

syzbot is able to trigger the following crash [1],
caused by unsafe ip6_dst_idev() use.

Indeed ip6_dst_idev() can return NULL, and must always be checked.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]
 RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267
Code: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 &lt;42&gt; 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c
RSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700
RDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760
RBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd
R10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000
R13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00
FS:  00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317
  fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108
  ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]
  ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649
  ip6_route_output include/net/ip6_route.h:93 [inline]
  ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120
  ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250
  sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326
  sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455
  sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662
  sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099
  __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197
  sctp_connect net/sctp/socket.c:4819 [inline]
  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834
  __sys_connect_file net/socket.c:2048 [inline]
  __sys_connect+0x2df/0x310 net/socket.c:2065
  __do_sys_connect net/socket.c:2075 [inline]
  __se_sys_connect net/socket.c:2072 [inline]
  __x64_sys_connect+0x7a/0x90 net/socket.c:2072
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225719">SUSE bug 1225719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().

Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique()
with nice analysis.

Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for
timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's
sk_refcnt after putting it into ehash and releasing the bucket lock.

Thus, there is a small race window where other threads could try to
reuse the port during connect() and call sock_hold() in tcp_twsk_unique()
for the TIME-WAIT socket with zero refcnt.

If that happens, the refcnt taken by tcp_twsk_unique() is overwritten
and sock_put() will cause underflow, triggering a real use-after-free
somewhere else.

To avoid the use-after-free, we need to use refcount_inc_not_zero() in
tcp_twsk_unique() and give up on reusing the port if it returns false.

[0]:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110
CPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023
RIP: 0010:refcount_warn_saturate+0xe5/0x110
Code: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff &lt;0f&gt; 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8
RSP: 0018:ffffc90006b43b60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027
RDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0
RBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0
R10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84
R13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0
FS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? refcount_warn_saturate+0xe5/0x110
 ? __warn+0x81/0x130
 ? refcount_warn_saturate+0xe5/0x110
 ? report_bug+0x171/0x1a0
 ? refcount_warn_saturate+0xe5/0x110
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? refcount_warn_saturate+0xe5/0x110
 tcp_twsk_unique+0x186/0x190
 __inet_check_established+0x176/0x2d0
 __inet_hash_connect+0x74/0x7d0
 ? __pfx___inet_check_established+0x10/0x10
 tcp_v4_connect+0x278/0x530
 __inet_stream_connect+0x10f/0x3d0
 inet_stream_connect+0x3a/0x60
 __sys_connect+0xa8/0xd0
 __x64_sys_connect+0x18/0x20
 do_syscall_64+0x83/0x170
 entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f62c11a885d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d
RDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003
RBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0
R13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225733">SUSE bug 1225733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36905" ref_url="https://www.suse.com/security/cve/CVE-2024-36905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets

TCP_SYN_RECV state is really special, it is only used by
cross-syn connections, mostly used by fuzzers.

In the following crash [1], syzbot managed to trigger a divide
by zero in tcp_rcv_space_adjust()

A socket makes the following state transitions,
without ever calling tcp_init_transfer(),
meaning tcp_init_buffer_space() is also not called.

         TCP_CLOSE
connect()
         TCP_SYN_SENT
         TCP_SYN_RECV
shutdown() -&gt; tcp_shutdown(sk, SEND_SHUTDOWN)
         TCP_FIN_WAIT1

To fix this issue, change tcp_shutdown() to not
perform a TCP_SYN_RECV -&gt; TCP_FIN_WAIT1 transition,
which makes no sense anyway.

When tcp_rcv_state_process() later changes socket state
from TCP_SYN_RECV to TCP_ESTABLISH, then look at
sk-&gt;sk_shutdown to finally enter TCP_FIN_WAIT1 state,
and send a FIN packet from a sane socket state.

This means tcp_send_fin() can now be called from BH
context, and must use GFP_ATOMIC allocations.

[1]
divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 1 PID: 5084 Comm: syz-executor358 Not tainted 6.9.0-rc6-syzkaller-00022-g98369dccd2f8 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:tcp_rcv_space_adjust+0x2df/0x890 net/ipv4/tcp_input.c:767
Code: e3 04 4c 01 eb 48 8b 44 24 38 0f b6 04 10 84 c0 49 89 d5 0f 85 a5 03 00 00 41 8b 8e c8 09 00 00 89 e8 29 c8 48 0f af c3 31 d2 &lt;48&gt; f7 f1 48 8d 1c 43 49 8d 96 76 08 00 00 48 89 d0 48 c1 e8 03 48
RSP: 0018:ffffc900031ef3f0 EFLAGS: 00010246
RAX: 0c677a10441f8f42 RBX: 000000004fb95e7e RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000027d4b11f R08: ffffffff89e535a4 R09: 1ffffffff25e6ab7
R10: dffffc0000000000 R11: ffffffff8135e920 R12: ffff88802a9f8d30
R13: dffffc0000000000 R14: ffff88802a9f8d00 R15: 1ffff1100553f2da
FS:  00005555775c0380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1155bf2304 CR3: 000000002b9f2000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
  tcp_recvmsg_locked+0x106d/0x25a0 net/ipv4/tcp.c:2513
  tcp_recvmsg+0x25d/0x920 net/ipv4/tcp.c:2578
  inet6_recvmsg+0x16a/0x730 net/ipv6/af_inet6.c:680
  sock_recvmsg_nosec net/socket.c:1046 [inline]
  sock_recvmsg+0x109/0x280 net/socket.c:1068
  ____sys_recvmsg+0x1db/0x470 net/socket.c:2803
  ___sys_recvmsg net/socket.c:2845 [inline]
  do_recvmmsg+0x474/0xae0 net/socket.c:2939
  __sys_recvmmsg net/socket.c:3018 [inline]
  __do_sys_recvmmsg net/socket.c:3041 [inline]
  __se_sys_recvmmsg net/socket.c:3034 [inline]
  __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7faeb6363db9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcc1997168 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faeb6363db9
RDX: 0000000000000001 RSI: 0000000020000bc0 RDI: 0000000000000005
RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000001c
R10: 0000000000000122 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36905/">CVE-2024-36905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36906</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9381/1: kasan: clear stale stack poison

We found below OOB crash:

[   33.452494] ==================================================================
[   33.453513] BUG: KASAN: stack-out-of-bounds in refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec
[   33.454660] Write of size 164 at addr c1d03d30 by task swapper/0/0
[   33.455515]
[   33.455767] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           O       6.1.25-mainline #1
[   33.456880] Hardware name: Generic DT based system
[   33.457555]  unwind_backtrace from show_stack+0x18/0x1c
[   33.458326]  show_stack from dump_stack_lvl+0x40/0x4c
[   33.459072]  dump_stack_lvl from print_report+0x158/0x4a4
[   33.459863]  print_report from kasan_report+0x9c/0x148
[   33.460616]  kasan_report from kasan_check_range+0x94/0x1a0
[   33.461424]  kasan_check_range from memset+0x20/0x3c
[   33.462157]  memset from refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec
[   33.463064]  refresh_cpu_vm_stats.constprop.0 from tick_nohz_idle_stop_tick+0x180/0x53c
[   33.464181]  tick_nohz_idle_stop_tick from do_idle+0x264/0x354
[   33.465029]  do_idle from cpu_startup_entry+0x20/0x24
[   33.465769]  cpu_startup_entry from rest_init+0xf0/0xf4
[   33.466528]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[   33.467397]
[   33.467644] The buggy address belongs to stack of task swapper/0/0
[   33.468493]  and is located at offset 112 in frame:
[   33.469172]  refresh_cpu_vm_stats.constprop.0+0x0/0x2ec
[   33.469917]
[   33.470165] This frame has 2 objects:
[   33.470696]  [32, 76) 'global_zone_diff'
[   33.470729]  [112, 276) 'global_node_diff'
[   33.471294]
[   33.472095] The buggy address belongs to the physical page:
[   33.472862] page:3cd72da8 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x41d03
[   33.473944] flags: 0x1000(reserved|zone=0)
[   33.474565] raw: 00001000 ed741470 ed741470 00000000 00000000 00000000 ffffffff 00000001
[   33.475656] raw: 00000000
[   33.476050] page dumped because: kasan: bad access detected
[   33.476816]
[   33.477061] Memory state around the buggy address:
[   33.477732]  c1d03c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.478630]  c1d03c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00
[   33.479526] &gt;c1d03d00: 00 04 f2 f2 f2 f2 00 00 00 00 00 00 f1 f1 f1 f1
[   33.480415]                                                ^
[   33.481195]  c1d03d80: 00 00 00 00 00 00 00 00 00 00 04 f3 f3 f3 f3 f3
[   33.482088]  c1d03e00: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[   33.482978] ==================================================================

We find the root cause of this OOB is that arm does not clear stale stack
poison in the case of cpuidle.

This patch refer to arch/arm64/kernel/sleep.S to resolve this issue.

From cited commit [1] that explain the problem

Functions which the compiler has instrumented for KASAN place poison on
the stack shadow upon entry and remove this poison prior to returning.

In the case of cpuidle, CPUs exit the kernel a number of levels deep in
C code.  Any instrumented functions on this critical path will leave
portions of the stack shadow poisoned.

If CPUs lose context and return to the kernel via a cold path, we
restore a prior context saved in __cpu_suspend_enter are forgotten, and
we never remove the poison they placed in the stack shadow area by
functions calls between this and the actual exit of the kernel.

Thus, (depending on stackframe layout) subsequent calls to instrumented
functions may hit this stale poison, resulting in (spurious) KASAN
splats to the console.

To avoid this, clear any stale poison from the idle thread for a CPU
prior to bringing a CPU online.

From cited commit [2]

Extend to check for CONFIG_KASAN_STACK

[1] commit 0d97e6d8024c ("arm64: kasan: clear stale stack poison")
[2] commit d56a9ef84bd0 ("kasan, arm64: unpoison stack only with CONFIG_KASAN_STACK")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225715">SUSE bug 1225715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36909</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

The VMBus ring buffer code could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the struct
vmbus_gpadl for the ring buffers to decide whether to free the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225744">SUSE bug 1225744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36910</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Don't free decrypted memory

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

The VMBus device UIO driver could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the gpadl
to decide whether to free the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225717">SUSE bug 1225717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36911</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Don't free decrypted memory

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

The netvsc driver could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the gpadl
to decide whether to free the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225745">SUSE bug 1225745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

In order to make sure callers of vmbus_establish_gpadl() and
vmbus_teardown_gpadl() don't return decrypted/shared pages to
allocators, add a field in struct vmbus_gpadl to keep track of the
decryption status of the buffers. This will allow the callers to
know if they should free or leak the pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225752">SUSE bug 1225752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()
fails. Leak the pages if this happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225753">SUSE bug 1225753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip on writeback when it's not applicable

[WHY]
dynamic memory safety error detector (KASAN) catches and generates error
messages "BUG: KASAN: slab-out-of-bounds" as writeback connector does not
support certain features which are not initialized.

[HOW]
Skip them when connector type is DRM_MODE_CONNECTOR_WRITEBACK.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225757">SUSE bug 1225757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36915</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies

syzbot reported unsafe calls to copy_from_sockptr() [1]

Use copy_safe_from_sockptr() instead.

[1]

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
Read of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078

CPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
  do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfd/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f7fac07fd89
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89
RDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225758">SUSE bug 1225758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: avoid out of bounds shift

UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg-&gt;delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.

[  186.556576] ------------[ cut here ]------------
UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23
shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')
CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1
Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x8f/0xe0
 __ubsan_handle_shift_out_of_bounds+0x22c/0x280
 iocg_kick_delay+0x30b/0x310
 ioc_timer_fn+0x2fb/0x1f80
 __run_timer_base+0x1b6/0x250
...

Avoid that undefined behavior by simply taking the
"delay = 0" branch if the shift is too large.

I am not sure what the symptoms of an undefined value
delay will be, but I suspect it could be more than a
little annoying to debug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225759">SUSE bug 1225759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36917</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix overflow in blk_ioctl_discard()

There is no check for overflow of 'start + len' in blk_ioctl_discard().
Hung task occurs if submit an discard ioctl with the following param:
  start = 0x80000000000ff000, len = 0x8000000000fff000;
Add the overflow validation now.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225770">SUSE bug 1225770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check bloom filter map value size

This patch adds a missing check to bloom filter creating, rejecting
values above KMALLOC_MAX_SIZE. This brings the bloom map in line with
many other map types.

The lack of this protection can cause kernel crashes for value sizes
that overflow int's. Such a crash was caught by syzkaller. The next
patch adds more guard-rails at a lower level.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225766">SUSE bug 1225766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload

The session resources are used by FW and driver when session is offloaded,
once session is uploaded these resources are not used. The lock is not
required as these fields won't be used any longer. The offload and upload
calls are sequential, hence lock is not required.

This will suppress following BUG_ON():

[  449.843143] ------------[ cut here ]------------
[  449.848302] kernel BUG at mm/vmalloc.c:2727!
[  449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[  449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1
Rebooting.
[  449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016
[  449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]
[  449.882910] RIP: 0010:vunmap+0x2e/0x30
[  449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 &lt;0f&gt; 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41
[  449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206
[  449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005
[  449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000
[  449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf
[  449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000
[  449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0
[  449.953701] FS:  0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000
[  449.962732] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0
[  449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  449.993028] Call Trace:
[  449.995756]  __iommu_dma_free+0x96/0x100
[  450.000139]  bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]
[  450.006171]  bnx2fc_upload_session+0xce/0x100 [bnx2fc]
[  450.011910]  bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]
[  450.018136]  fc_rport_work+0x103/0x5b0 [libfc]
[  450.023103]  process_one_work+0x1e8/0x3c0
[  450.027581]  worker_thread+0x50/0x3b0
[  450.031669]  ? rescuer_thread+0x370/0x370
[  450.036143]  kthread+0x149/0x170
[  450.039744]  ? set_kthread_struct+0x40/0x40
[  450.044411]  ret_from_fork+0x22/0x30
[  450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls
[  450.048497]  libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler
[  450.159753] ---[ end trace 712de2c57c64abc8 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/9p: fix uninitialized values during inode evict

If an iget fails due to not being able to retrieve information
from the server then the inode structure is only partially
initialized.  When the inode gets evicted, references to
uninitialized structures (like fscache cookies) were being
made.

This patch checks for a bad_inode before doing anything other
than clearing the inode from the cache.  Since the inode is
bad, it shouldn't have any state associated with it that needs
to be written back (and there really isn't a way to complete
those anyways).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225815">SUSE bug 1225815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()

lpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the
hbalock.  Thus, lpfc_worker_wake_up() should not be called while holding the
hbalock to avoid potential deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36926</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE

At the time of LPAR boot up, partition firmware provides Open Firmware
property ibm,dma-window for the PE. This property is provided on the PCI
bus the PE is attached to.

There are execptions where the partition firmware might not provide this
property for the PE at the time of LPAR boot up. One of the scenario is
where the firmware has frozen the PE due to some error condition. This
PE is frozen for 24 hours or unless the whole system is reinitialized.

Within this time frame, if the LPAR is booted, the frozen PE will be
presented to the LPAR but ibm,dma-window property could be missing.

Today, under these circumstances, the LPAR oopses with NULL pointer
dereference, when configuring the PCI bus the PE is attached to.

  BUG: Kernel NULL pointer dereference on read at 0x000000c8
  Faulting instruction address: 0xc0000000001024c0
  Oops: Kernel access of bad area, sig: 7 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in:
  Supported: Yes
  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-150600.9-default #1
  Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_023) hv:phyp pSeries
  NIP:  c0000000001024c0 LR: c0000000001024b0 CTR: c000000000102450
  REGS: c0000000037db5c0 TRAP: 0300   Not tainted  (6.4.0-150600.9-default)
  MSR:  8000000002009033 &lt;SF,VEC,EE,ME,IR,DR,RI,LE&gt;  CR: 28000822  XER: 00000000
  CFAR: c00000000010254c DAR: 00000000000000c8 DSISR: 00080000 IRQMASK: 0
  ...
  NIP [c0000000001024c0] pci_dma_bus_setup_pSeriesLP+0x70/0x2a0
  LR [c0000000001024b0] pci_dma_bus_setup_pSeriesLP+0x60/0x2a0
  Call Trace:
    pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 (unreliable)
    pcibios_setup_bus_self+0x1c0/0x370
    __of_scan_bus+0x2f8/0x330
    pcibios_scan_phb+0x280/0x3d0
    pcibios_init+0x88/0x12c
    do_one_initcall+0x60/0x320
    kernel_init_freeable+0x344/0x3e4
    kernel_init+0x34/0x1d0
    ret_from_kernel_user_thread+0x14/0x1c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36928</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: Fix kernel panic after setting hsuid

Symptom:
When the hsuid attribute is set for the first time on an IQD Layer3
device while the corresponding network interface is already UP,
the kernel will try to execute a napi function pointer that is NULL.

Example:
---------------------------------------------------------------------------
[ 2057.572696] illegal operation: 0001 ilc:1 [#1] SMP
[ 2057.572702] Modules linked in: af_iucv qeth_l3 zfcp scsi_transport_fc sunrpc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6
nft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink ghash_s390 prng xts aes_s390 des_s390 de
s_generic sha3_512_s390 sha3_256_s390 sha512_s390 vfio_ccw vfio_mdev mdev vfio_iommu_type1 eadm_sch vfio ext4 mbcache jbd2 qeth_l2 bridge stp llc dasd_eckd_mod qeth dasd_mod
 qdio ccwgroup pkey zcrypt
[ 2057.572739] CPU: 6 PID: 60182 Comm: stress_client Kdump: loaded Not tainted 4.18.0-541.el8.s390x #1
[ 2057.572742] Hardware name: IBM 3931 A01 704 (LPAR)
[ 2057.572744] Krnl PSW : 0704f00180000000 0000000000000002 (0x2)
[ 2057.572748]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3
[ 2057.572751] Krnl GPRS: 0000000000000004 0000000000000000 00000000a3b008d8 0000000000000000
[ 2057.572754]            00000000a3b008d8 cb923a29c779abc5 0000000000000000 00000000814cfd80
[ 2057.572756]            000000000000012c 0000000000000000 00000000a3b008d8 00000000a3b008d8
[ 2057.572758]            00000000bab6d500 00000000814cfd80 0000000091317e46 00000000814cfc68
[ 2057.572762] Krnl Code:#0000000000000000: 0000                illegal
                         &gt;0000000000000002: 0000                illegal
                          0000000000000004: 0000                illegal
                          0000000000000006: 0000                illegal
                          0000000000000008: 0000                illegal
                          000000000000000a: 0000                illegal
                          000000000000000c: 0000                illegal
                          000000000000000e: 0000                illegal
[ 2057.572800] Call Trace:
[ 2057.572801] ([&lt;00000000ec639700&gt;] 0xec639700)
[ 2057.572803]  [&lt;00000000913183e2&gt;] net_rx_action+0x2ba/0x398
[ 2057.572809]  [&lt;0000000091515f76&gt;] __do_softirq+0x11e/0x3a0
[ 2057.572813]  [&lt;0000000090ce160c&gt;] do_softirq_own_stack+0x3c/0x58
[ 2057.572817] ([&lt;0000000090d2cbd6&gt;] do_softirq.part.1+0x56/0x60)
[ 2057.572822]  [&lt;0000000090d2cc60&gt;] __local_bh_enable_ip+0x80/0x98
[ 2057.572825]  [&lt;0000000091314706&gt;] __dev_queue_xmit+0x2be/0xd70
[ 2057.572827]  [&lt;000003ff803dd6d6&gt;] afiucv_hs_send+0x24e/0x300 [af_iucv]
[ 2057.572830]  [&lt;000003ff803dd88a&gt;] iucv_send_ctrl+0x102/0x138 [af_iucv]
[ 2057.572833]  [&lt;000003ff803de72a&gt;] iucv_sock_connect+0x37a/0x468 [af_iucv]
[ 2057.572835]  [&lt;00000000912e7e90&gt;] __sys_connect+0xa0/0xd8
[ 2057.572839]  [&lt;00000000912e9580&gt;] sys_socketcall+0x228/0x348
[ 2057.572841]  [&lt;0000000091514e1a&gt;] system_call+0x2a6/0x2c8
[ 2057.572843] Last Breaking-Event-Address:
[ 2057.572844]  [&lt;0000000091317e44&gt;] __napi_poll+0x4c/0x1d8
[ 2057.572846]
[ 2057.572847] Kernel panic - not syncing: Fatal exception in interrupt
-------------------------------------------------------------------------------------------

Analysis:
There is one napi structure per out_q: card-&gt;qdio.out_qs[i].napi
The napi.poll functions are set during qeth_open().

Since
commit 1cfef80d4c2b ("s390/qeth: Don't call dev_close/dev_open (DOWN/UP)")
qeth_set_offline()/qeth_set_online() no longer call dev_close()/
dev_open(). So if qeth_free_qdio_queues() cleared
card-&gt;qdio.out_qs[i].napi.poll while the network interface was UP and the
card was offline, they are not set again.

Reproduction:
chzdev -e $devno layer2=0
ip link set dev $network_interface up
echo 0 &gt; /sys/bus/ccw
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225775">SUSE bug 1225775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: reject skb_copy(_expand) for fraglist GSO skbs

SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become
invalid. Return NULL if such an skb is passed to skb_copy or
skb_copy_expand, in order to prevent a crash on a potential later
call to skb_gso_segment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225814">SUSE bug 1225814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cio: Ensure the copied buf is NUL terminated

Currently, we allocate a lbuf-sized kernel buffer and copy lbuf from
userspace to that buffer. Later, we use scanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using scanf. Fix this issue by using memdup_user_nul instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225747">SUSE bug 1225747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36933</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nsh: Restore skb-&gt;{protocol,data,mac_header} for outer header in nsh_gso_segment().

syzbot triggered various splats (see [0] and links) by a crafted GSO
packet of VIRTIO_NET_HDR_GSO_UDP layering the following protocols:

  ETH_P_8021AD + ETH_P_NSH + ETH_P_IPV6 + IPPROTO_UDP

NSH can encapsulate IPv4, IPv6, Ethernet, NSH, and MPLS.  As the inner
protocol can be Ethernet, NSH GSO handler, nsh_gso_segment(), calls
skb_mac_gso_segment() to invoke inner protocol GSO handlers.

nsh_gso_segment() does the following for the original skb before
calling skb_mac_gso_segment()

  1. reset skb-&gt;network_header
  2. save the original skb-&gt;{mac_heaeder,mac_len} in a local variable
  3. pull the NSH header
  4. resets skb-&gt;mac_header
  5. set up skb-&gt;mac_len and skb-&gt;protocol for the inner protocol.

and does the following for the segmented skb

  6. set ntohs(ETH_P_NSH) to skb-&gt;protocol
  7. push the NSH header
  8. restore skb-&gt;mac_header
  9. set skb-&gt;mac_header + mac_len to skb-&gt;network_header
 10. restore skb-&gt;mac_len

There are two problems in 6-7 and 8-9.

  (a)
  After 6 &amp; 7, skb-&gt;data points to the NSH header, so the outer header
  (ETH_P_8021AD in this case) is stripped when skb is sent out of netdev.

  Also, if NSH is encapsulated by NSH + Ethernet (so NSH-Ethernet-NSH),
  skb_pull() in the first nsh_gso_segment() will make skb-&gt;data point
  to the middle of the outer NSH or Ethernet header because the Ethernet
  header is not pulled by the second nsh_gso_segment().

  (b)
  While restoring skb-&gt;{mac_header,network_header} in 8 &amp; 9,
  nsh_gso_segment() does not assume that the data in the linear
  buffer is shifted.

  However, udp6_ufo_fragment() could shift the data and change
  skb-&gt;mac_header accordingly as demonstrated by syzbot.

  If this happens, even the restored skb-&gt;mac_header points to
  the middle of the outer header.

It seems nsh_gso_segment() has never worked with outer headers so far.

At the end of nsh_gso_segment(), the outer header must be restored for
the segmented skb, instead of the NSH header.

To do that, let's calculate the outer header position relatively from
the inner header and set skb-&gt;{data,mac_header,protocol} properly.

[0]:
BUG: KMSAN: uninit-value in ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]
BUG: KMSAN: uninit-value in ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
BUG: KMSAN: uninit-value in ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668
 ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]
 ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
 ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668
 ipvlan_start_xmit+0x5c/0x1a0 drivers/net/ipvlan/ipvlan_main.c:222
 __netdev_start_xmit include/linux/netdevice.h:4989 [inline]
 netdev_start_xmit include/linux/netdevice.h:5003 [inline]
 xmit_one net/core/dev.c:3547 [inline]
 dev_hard_start_xmit+0x244/0xa10 net/core/dev.c:3563
 __dev_queue_xmit+0x33ed/0x51c0 net/core/dev.c:4351
 dev_queue_xmit include/linux/netdevice.h:3171 [inline]
 packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3081 [inline]
 packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3819 [inline]
 slab_alloc_node mm/slub.c:3860 [inline]
 __do_kmalloc_node mm/slub.c:3980 [inline]
 __kmalloc_node_track_caller+0x705/0x1000 mm/slub.c:4001
 kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582
 __
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225832">SUSE bug 1225832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bna: ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225760">SUSE bug 1225760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36936</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/unaccepted: touch soft lockup during memory accept

Commit 50e782a86c98 ("efi/unaccepted: Fix soft lockups caused by
parallel memory acceptance") has released the spinlock so other CPUs can
do memory acceptance in parallel and not triggers softlockup on other
CPUs.

However the softlock up was intermittent shown up if the memory of the
TD guest is large, and the timeout of softlockup is set to 1 second:

 RIP: 0010:_raw_spin_unlock_irqrestore
 Call Trace:
 ? __hrtimer_run_queues
 &lt;IRQ&gt;
 ? hrtimer_interrupt
 ? watchdog_timer_fn
 ? __sysvec_apic_timer_interrupt
 ? __pfx_watchdog_timer_fn
 ? sysvec_apic_timer_interrupt
 &lt;/IRQ&gt;
 ? __hrtimer_run_queues
 &lt;TASK&gt;
 ? hrtimer_interrupt
 ? asm_sysvec_apic_timer_interrupt
 ? _raw_spin_unlock_irqrestore
 ? __sysvec_apic_timer_interrupt
 ? sysvec_apic_timer_interrupt
 accept_memory
 try_to_accept_memory
 do_huge_pmd_anonymous_page
 get_page_from_freelist
 __handle_mm_fault
 __alloc_pages
 __folio_alloc
 ? __tdx_hypercall
 handle_mm_fault
 vma_alloc_folio
 do_user_addr_fault
 do_huge_pmd_anonymous_page
 exc_page_fault
 ? __do_huge_pmd_anonymous_page
 asm_exc_page_fault
 __handle_mm_fault

When the local irq is enabled at the end of accept_memory(), the
softlockup detects that the watchdog on single CPU has not been fed for
a while. That is to say, even other CPUs will not be blocked by
spinlock, the current CPU might be stunk with local irq disabled for a
while, which hurts not only nmi watchdog but also softlockup.

Chao Gao pointed out that the memory accept could be time costly and
there was similar report before. Thus to avoid any softlocup detection
during this stage, give the softlockup a flag to skip the timeout check
at the end of accept_memory(), by invoking touch_softlockup_watchdog().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225773">SUSE bug 1225773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36937</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: use flags field to disambiguate broadcast redirect

When redirecting a packet using XDP, the bpf_redirect_map() helper will set
up the redirect destination information in struct bpf_redirect_info (using
the __bpf_xdp_redirect_map() helper function), and the xdp_do_redirect()
function will read this information after the XDP program returns and pass
the frame on to the right redirect destination.

When using the BPF_F_BROADCAST flag to do multicast redirect to a whole
map, __bpf_xdp_redirect_map() sets the 'map' pointer in struct
bpf_redirect_info to point to the destination map to be broadcast. And
xdp_do_redirect() reacts to the value of this map pointer to decide whether
it's dealing with a broadcast or a single-value redirect. However, if the
destination map is being destroyed before xdp_do_redirect() is called, the
map pointer will be cleared out (by bpf_clear_redirect_map()) without
waiting for any XDP programs to stop running. This causes xdp_do_redirect()
to think that the redirect was to a single target, but the target pointer
is also NULL (since broadcast redirects don't have a single target), so
this causes a crash when a NULL pointer is passed to dev_map_enqueue().

To fix this, change xdp_do_redirect() to react directly to the presence of
the BPF_F_BROADCAST flag in the 'flags' value in struct bpf_redirect_info
to disambiguate between a single-target and a broadcast redirect. And only
read the 'map' pointer if the broadcast flag is set, aborting if that has
been cleared out in the meantime. This prevents the crash, while keeping
the atomic (cmpxchg-based) clearing of the map pointer itself, and without
adding any more checks in the non-broadcast fast path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225834">SUSE bug 1225834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue

Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which
syzbot reported [1].

[1]
BUG: KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue

write to 0xffff88814b3278b8 of 8 bytes by task 10724 on cpu 1:
 sk_psock_stop_verdict net/core/skmsg.c:1257 [inline]
 sk_psock_drop+0x13e/0x1f0 net/core/skmsg.c:843
 sk_psock_put include/linux/skmsg.h:459 [inline]
 sock_map_close+0x1a7/0x260 net/core/sock_map.c:1648
 unix_release+0x4b/0x80 net/unix/af_unix.c:1048
 __sock_release net/socket.c:659 [inline]
 sock_close+0x68/0x150 net/socket.c:1421
 __fput+0x2c1/0x660 fs/file_table.c:422
 __fput_sync+0x44/0x60 fs/file_table.c:507
 __do_sys_close fs/open.c:1556 [inline]
 __se_sys_close+0x101/0x1b0 fs/open.c:1541
 __x64_sys_close+0x1f/0x30 fs/open.c:1541
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

read to 0xffff88814b3278b8 of 8 bytes by task 10713 on cpu 0:
 sk_psock_data_ready include/linux/skmsg.h:464 [inline]
 sk_psock_skb_ingress_enqueue+0x32d/0x390 net/core/skmsg.c:555
 sk_psock_skb_ingress_self+0x185/0x1e0 net/core/skmsg.c:606
 sk_psock_verdict_apply net/core/skmsg.c:1008 [inline]
 sk_psock_verdict_recv+0x3e4/0x4a0 net/core/skmsg.c:1202
 unix_read_skb net/unix/af_unix.c:2546 [inline]
 unix_stream_read_skb+0x9e/0xf0 net/unix/af_unix.c:2682
 sk_psock_verdict_data_ready+0x77/0x220 net/core/skmsg.c:1223
 unix_stream_sendmsg+0x527/0x860 net/unix/af_unix.c:2339
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x140/0x180 net/socket.c:745
 ____sys_sendmsg+0x312/0x410 net/socket.c:2584
 ___sys_sendmsg net/socket.c:2638 [inline]
 __sys_sendmsg+0x1e9/0x280 net/socket.c:2667
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

value changed: 0xffffffff83d7feb0 -&gt; 0x0000000000000000

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 10713 Comm: syz-executor.4 Tainted: G        W          6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024

Prior to this, commit 4cd12c6065df ("bpf, sockmap: Fix NULL pointer
dereference in sk_psock_verdict_data_ready()") fixed one NULL pointer
similarly due to no protection of saved_data_ready. Here is another
different caller causing the same issue because of the same reason. So
we should protect it with sk_callback_lock read lock because the writer
side in the sk_psock_drop() uses "write_lock_bh(&amp;sk-&gt;sk_callback_lock);".

To avoid errors that could happen in future, I move those two pairs of
lock into the sk_psock_data_ready(), which is suggested by John Fastabend.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225761">SUSE bug 1225761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: Handle error of rpc_proc_register() in nfs_net_init().

syzkaller reported a warning [0] triggered while destroying immature
netns.

rpc_proc_register() was called in init_nfs_fs(), but its error
has been ignored since at least the initial commit 1da177e4c3f4
("Linux-2.6.12-rc2").

Recently, commit d47151b79e32 ("nfs: expose /proc/net/sunrpc/nfs
in net namespaces") converted the procfs to per-netns and made
the problem more visible.

Even when rpc_proc_register() fails, nfs_net_init() could succeed,
and thus nfs_net_exit() will be called while destroying the netns.

Then, remove_proc_entry() will be called for non-existing proc
directory and trigger the warning below.

Let's handle the error of rpc_proc_register() properly in nfs_net_init().

[0]:
name 'nfs'
WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
Modules linked in:
CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff &lt;0f&gt; 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb
RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c
RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc
R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8
FS:  00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310
 nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438
 ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170
 setup_net+0x46c/0x660 net/core/net_namespace.c:372
 copy_net_ns+0x244/0x590 net/core/net_namespace.c:505
 create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228
 ksys_unshare+0x342/0x760 kernel/fork.c:3322
 __do_sys_unshare kernel/fork.c:3393 [inline]
 __se_sys_unshare kernel/fork.c:3391 [inline]
 __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0x7f30d0febe5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600
RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225838">SUSE bug 1225838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36940</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: core: delete incorrect free in pinctrl_enable()

The "pctldev" struct is allocated in devm_pinctrl_register_and_init().
It's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),
so freeing it in pinctrl_enable() will lead to a double free.

The devm_pinctrl_dev_release() function frees the pindescs and destroys
the mutex as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225841">SUSE bug 1225841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36941</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: don't free NULL coalescing rule

If the parsing fails, we can dereference a NULL pointer here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36942</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix firmware check error path

A recent commit fixed the code that parses the firmware files before
downloading them to the controller but introduced a memory leak in case
the sanity checks ever fail.

Make sure to free the firmware buffer before returning on errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225843">SUSE bug 1225843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36944</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Reapply "drm/qxl: simplify qxl_fence_wait"

This reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.

Stephen Rostedt reports:
 "I went to run my tests on my VMs and the tests hung on boot up.
  Unfortunately, the most I ever got out was:

  [   93.607888] Testing event system initcall: OK
  [   93.667730] Running tests on all trace events:
  [   93.669757] Testing all events: OK
  [   95.631064] ------------[ cut here ]------------
  Timed out after 60 seconds"

and further debugging points to a possible circular locking dependency
between the console_owner locking and the worker pool locking.

Reverting the commit allows Steve's VM to boot to completion again.

[ This may obviously result in the "[TTM] Buffer eviction failed"
  messages again, which was the reason for that original revert. But at
  this point this seems preferable to a non-booting system... ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225847">SUSE bug 1225847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix neighbour and rtable leak in smc_ib_find_route()

In smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable
resolved by ip_route_output_flow() are not released or put before return.
It may cause the refcount leak, so fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225823">SUSE bug 1225823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36946</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phonet: fix rtm_phonet_notify() skb allocation

fill_route() stores three components in the skb:

- struct rtmsg
- RTA_DST (u8)
- RTA_OIF (u32)

Therefore, rtm_phonet_notify() should use

NLMSG_ALIGN(sizeof(struct rtmsg)) +
nla_total_size(1) +
nla_total_size(4)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225851">SUSE bug 1225851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36947</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

qibfs: fix dentry leak

simple_recursive_removal() drops the pinning references to all positives
in subtree.  For the cases when its argument has been kept alive by
the pinning alone that's exactly the right thing to do, but here
the argument comes from dcache lookup, that needs to be balanced by
explicit dput().

Fucked-up-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225856">SUSE bug 1225856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36949</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: sync all devices to wait all processes being evicted

If there are more than one device doing reset in parallel, the first
device will call kfd_suspend_all_processes() to evict all processes
on all devices, this call takes time to finish. other device will
start reset and recover without waiting. if the process has not been
evicted before doing recover, it will be restored, then caused page
fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225894">SUSE bug 1225894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36950</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firewire: ohci: mask bus reset interrupts between ISR and bottom half

In the FireWire OHCI interrupt handler, if a bus reset interrupt has
occurred, mask bus reset interrupts until bus_reset_work has serviced and
cleared the interrupt.

Normally, we always leave bus reset interrupts masked. We infer the bus
reset from the self-ID interrupt that happens shortly thereafter. A
scenario where we unmask bus reset interrupts was introduced in 2008 in
a007bb857e0b26f5d8b73c2ff90782d9c0972620: If
OHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we
will unmask bus reset interrupts so we can log them.

irq_handler logs the bus reset interrupt. However, we can't clear the bus
reset event flag in irq_handler, because we won't service the event until
later. irq_handler exits with the event flag still set. If the
corresponding interrupt is still unmasked, the first bus reset will
usually freeze the system due to irq_handler being called again each
time it exits. This freeze can be reproduced by loading firewire_ohci
with "modprobe firewire_ohci debug=-1" (to enable all debugging output).
Apparently there are also some cases where bus_reset_work will get called
soon enough to clear the event, and operation will continue normally.

This freeze was first reported a few months after a007bb85 was committed,
but until now it was never fixed. The debug level could safely be set
to -1 through sysfs after the module was loaded, but this would be
ineffectual in logging bus reset interrupts since they were only
unmasked during initialization.

irq_handler will now leave the event flag set but mask bus reset
interrupts, so irq_handler won't be called again and there will be no
freeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will
unmask the interrupt after servicing the event, so future interrupts
will be caught as desired.

As a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be
enabled through sysfs in addition to during initial module loading.
However, when enabled through sysfs, logging of bus reset interrupts will
be effective only starting with the second bus reset, after
bus_reset_work has executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225895">SUSE bug 1225895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36952</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Move NPIV's transport unregistration to after resource clean up

There are cases after NPIV deletion where the fabric switch still believes
the NPIV is logged into the fabric.  This occurs when a vport is
unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the
fabric.

Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including
the fabric D_ID, removes the last ndlp reference and frees the ndlp rport
object.  This sometimes causes the race condition where the final DA_ID and
LOGO are skipped from being sent to the fabric switch.

Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID
and LOGO are sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225898">SUSE bug 1225898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()

vgic_v2_parse_attr() is responsible for finding the vCPU that matches
the user-provided CPUID, which (of course) may not be valid. If the ID
is invalid, kvm_get_vcpu_by_id() returns NULL, which isn't handled
gracefully.

Similar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()
actually returns something and fail the ioctl if not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225812">SUSE bug 1225812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36954</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36954" ref_url="https://www.suse.com/security/cve/CVE-2024-36954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix a possible memleak in tipc_buf_append

__skb_linearize() doesn't free the skb when it fails, so move
'*buf = NULL' after __skb_linearize(), so that the skb can be
freed on the err path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36954/">CVE-2024-36954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225764">SUSE bug 1225764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36955</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()

The documentation for device_get_named_child_node() mentions this
important point:

"
The caller is responsible for calling fwnode_handle_put() on the
returned fwnode pointer.
"

Add fwnode_handle_put() to avoid a leaked reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36957</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: avoid off-by-one read from userspace

We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffer is NUL terminated, we use memdup_user_nul instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225762">SUSE bug 1225762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36959</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()

If we fail to allocate propname buffer, we need to drop the reference
count we just took. Because the pinctrl_dt_free_maps() includes the
droping operation, here we call it directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225839">SUSE bug 1225839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869880" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009869881" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36960</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix invalid reads in fence signaled events

Correctly set the length of the drm_event to the size of the structure
that's actually used.

The length of the drm_event was set to the parent structure instead of
to the drm_vmw_event_fence which is supposed to be read. drm_read
uses the length parameter to copy the event to the user space thus
resuling in oob reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225872">SUSE bug 1225872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36962</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs

Currently the driver uses local_bh_disable()/local_bh_enable() in its
IRQ handler to avoid triggering net_rx_action() softirq on exit from
netif_rx(). The net_rx_action() could trigger this driver .start_xmit
callback, which is protected by the same lock as the IRQ handler, so
calling the .start_xmit from netif_rx() from the IRQ handler critical
section protected by the lock could lead to an attempt to claim the
already claimed lock, and a hang.

The local_bh_disable()/local_bh_enable() approach works only in case
the IRQ handler is protected by a spinlock, but does not work if the
IRQ handler is protected by mutex, i.e. this works for KS8851 with
Parallel bus interface, but not for KS8851 with SPI bus interface.

Remove the BH manipulation and instead of calling netif_rx() inside
the IRQ handler code protected by the lock, queue all the received
SKBs in the IRQ handler into a queue first, and once the IRQ handler
exits the critical section protected by the lock, dequeue all the
queued SKBs and push them all into netif_rx(). At this point, it is
safe to trigger the net_rx_action() softirq, since the netif_rx()
call is outside of the lock that protects the IRQ handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225827">SUSE bug 1225827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36964</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/9p: only translate RWX permissions for plain 9P2000

Garbage in plain 9P2000's perm bits is allowed through, which causes it
to be able to set (among others) the suid bit. This was presumably not
the intent since the unix extended bits are handled explicitly and
conditionally on .u.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226325">SUSE bug 1226325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: mediatek: Make sure IPI buffer fits in L2TCM

The IPI buffer location is read from the firmware that we load to the
System Companion Processor, and it's not granted that both the SRAM
(L2TCM) size that is defined in the devicetree node is large enough
for that, and while this is especially true for multi-core SCP, it's
still useful to check on single-core variants as well.

Failing to perform this check may make this driver perform R/W
operations out of the L2TCM boundary, resulting (at best) in a
kernel panic.

To fix that, check that the IPI buffer fits, otherwise return a
failure and refuse to boot the relevant SCP core (or the SCP at
all, if this is single core).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226149">SUSE bug 1226149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix memory leak in tpm2_key_encode()

'scratch' is never freed. Fix this by calling kfree() in the success, and
in the error case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226131">SUSE bug 1226131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix division by zero in setup_dsc_config

When slice_height is 0, the division by slice_height in the calculation
of the number of slices will cause a division by zero driver crash. This
leaves the kernel in a state that requires a reboot. This patch adds a
check to avoid the division by zero.

The stack trace below is for the 6.8.4 Kernel. I reproduced the issue on
a Z16 Gen 2 Lenovo Thinkpad with a Apple Studio Display monitor
connected via Thunderbolt. The amdgpu driver crashed with this exception
when I rebooted the system with the monitor connected.

kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447)
kernel: ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminator 2))
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1109) amdgpu

After applying this patch, the driver no longer crashes when the monitor
is connected and the system is rebooted. I believe this is the same
issue reported for 3113.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226155">SUSE bug 1226155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36971</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="TID000021562" ref_url="https://www.suse.com/support/kb/doc/?id=000021562" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

__dst_negative_advice() does not enforce proper RCU rules when
sk-&gt;dst_cache must be cleared, leading to possible UAF.

RCU rules are that we must first clear sk-&gt;sk_dst_cache,
then call dst_release(old_dst).

Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.

Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three -&gt;negative_advice()
existing methods must perform the sk_dst_reset() themselves.

Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.

Many thanks to Clement Lecigne for tracking this issue.

This old bug became visible after the blamed commit, using UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226324">SUSE bug 1226324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36974</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP

If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,
taprio_parse_mqprio_opt() must validate it, or userspace
can inject arbitrary data to the kernel, the second time
taprio_change() is called.

First call (with valid attributes) sets dev-&gt;num_tc
to a non zero value.

Second call (with arbitrary mqprio attributes)
returns early from taprio_parse_mqprio_opt()
and bad things can happen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227371">SUSE bug 1227371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36975</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Do not use WARN when encode fails

When asn1_encode_sequence() fails, WARN is not the correct solution.

1. asn1_encode_sequence() is not an internal function (located
   in lib/asn1_encode.c).
2. Location is known, which makes the stack trace useless.
3. Results a crash if panic_on_warn is set.

It is also noteworthy that the use of WARN is undocumented, and it
should be avoided unless there is a carefully considered rationale to
use it.

Replace WARN with pr_err, and print the return value instead, which is
only useful piece of information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226520">SUSE bug 1226520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36978</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: sch_multiq: fix possible OOB write in multiq_tune()

q-&gt;bands will be assigned to qopt-&gt;bands to execute subsequent code logic
after kmalloc. So the old q-&gt;bands should not be used in kmalloc.
Otherwise, an out-of-bounds write will occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37021</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: manager: add owner module and take its refcount

The current implementation of the fpga manager assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the manager if
the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_manager
struct and use it to take the module's refcount. Modify the functions for
registering the manager to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the manager as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a manager without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga manager.

Other changes: opportunistically move put_device() from __fpga_mgr_get() to
fpga_mgr_get() and of_fpga_mgr_get() to improve code clarity since the
manager device is taken in these functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226950">SUSE bug 1226950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential kernel bug due to lack of writeback flag waiting

Destructive writes to a block device on which nilfs2 is mounted can cause
a kernel bug in the folio/page writeback start routine or writeback end
routine (__folio_start_writeback in the log below):

 kernel BUG at mm/page-writeback.c:3070!
 Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
 ...
 RIP: 0010:__folio_start_writeback+0xbaa/0x10e0
 Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff
  e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 &lt;0f&gt;
  0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00
 ...
 Call Trace:
  &lt;TASK&gt;
  nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2]
  nilfs_segctor_construct+0x181/0x6b0 [nilfs2]
  nilfs_segctor_thread+0x548/0x11c0 [nilfs2]
  kthread+0x2f0/0x390
  ret_from_fork+0x4b/0x80
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;

This is because when the log writer starts a writeback for segment summary
blocks or a super root block that use the backing device's page cache, it
does not wait for the ongoing folio/page writeback, resulting in an
inconsistent writeback state.

Fix this issue by waiting for ongoing writebacks when putting
folios/pages on the backing device into writeback state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227066">SUSE bug 1227066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BEJQC6TDQZLJ4YE746IHLCFJFUQ2JKQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224112">SUSE bug 1224112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865376" comment="containerized-data-importer-manifests-1.58.0-150500.6.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624363" comment="containerized-data-importer-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941061" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865822" comment="podman-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865823" comment="podman-docker-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865824" comment="podman-remote-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865825" comment="podmansh-4.9.5-150500.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009865581" comment="skopeo-1.14.4-150300.11.11.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009265412" comment="skopeo is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37353</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37353" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226875">SUSE bug 1226875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37354</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37354" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix crash on racing fsync and size-extending write into prealloc

We have been seeing crashes on duplicate keys in
btrfs_set_item_key_safe():

  BTRFS critical (device vdb): slot 4 key (450 108 8192) new key (450 108 8192)
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/ctree.c:2620!
  invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 PID: 3139 Comm: xfs_io Kdump: loaded Not tainted 6.9.0 #6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
  RIP: 0010:btrfs_set_item_key_safe+0x11f/0x290 [btrfs]

With the following stack trace:

  #0  btrfs_set_item_key_safe (fs/btrfs/ctree.c:2620:4)
  #1  btrfs_drop_extents (fs/btrfs/file.c:411:4)
  #2  log_one_extent (fs/btrfs/tree-log.c:4732:9)
  #3  btrfs_log_changed_extents (fs/btrfs/tree-log.c:4955:9)
  #4  btrfs_log_inode (fs/btrfs/tree-log.c:6626:9)
  #5  btrfs_log_inode_parent (fs/btrfs/tree-log.c:7070:8)
  #6  btrfs_log_dentry_safe (fs/btrfs/tree-log.c:7171:8)
  #7  btrfs_sync_file (fs/btrfs/file.c:1933:8)
  #8  vfs_fsync_range (fs/sync.c:188:9)
  #9  vfs_fsync (fs/sync.c:202:9)
  #10 do_fsync (fs/sync.c:212:9)
  #11 __do_sys_fdatasync (fs/sync.c:225:9)
  #12 __se_sys_fdatasync (fs/sync.c:223:1)
  #13 __x64_sys_fdatasync (fs/sync.c:223:1)
  #14 do_syscall_x64 (arch/x86/entry/common.c:52:14)
  #15 do_syscall_64 (arch/x86/entry/common.c:83:7)
  #16 entry_SYSCALL_64+0xaf/0x14c (arch/x86/entry/entry_64.S:121)

So we're logging a changed extent from fsync, which is splitting an
extent in the log tree. But this split part already exists in the tree,
triggering the BUG().

This is the state of the log tree at the time of the crash, dumped with
drgn (https://github.com/osandov/drgn/blob/main/contrib/btrfs_tree.py)
to get more details than btrfs_print_leaf() gives us:

  &gt;&gt;&gt; print_extent_buffer(prog.crashed_thread().stack_trace()[0]["eb"])
  leaf 33439744 level 0 items 72 generation 9 owner 18446744073709551610
  leaf 33439744 flags 0x100000000000000
  fs uuid e5bd3946-400c-4223-8923-190ef1f18677
  chunk uuid d58cb17e-6d02-494a-829a-18b7d8a399da
          item 0 key (450 INODE_ITEM 0) itemoff 16123 itemsize 160
                  generation 7 transid 9 size 8192 nbytes 8473563889606862198
                  block group 0 mode 100600 links 1 uid 0 gid 0 rdev 0
                  sequence 204 flags 0x10(PREALLOC)
                  atime 1716417703.220000000 (2024-05-22 15:41:43)
                  ctime 1716417704.983333333 (2024-05-22 15:41:44)
                  mtime 1716417704.983333333 (2024-05-22 15:41:44)
                  otime 17592186044416.000000000 (559444-03-08 01:40:16)
          item 1 key (450 INODE_REF 256) itemoff 16110 itemsize 13
                  index 195 namelen 3 name: 193
          item 2 key (450 XATTR_ITEM 1640047104) itemoff 16073 itemsize 37
                  location key (0 UNKNOWN.0 0) type XATTR
                  transid 7 data_len 1 name_len 6
                  name: user.a
                  data a
          item 3 key (450 EXTENT_DATA 0) itemoff 16020 itemsize 53
                  generation 9 type 1 (regular)
                  extent data disk byte 303144960 nr 12288
                  extent data offset 0 nr 4096 ram 12288
                  extent compression 0 (none)
          item 4 key (450 EXTENT_DATA 4096) itemoff 15967 itemsize 53
                  generation 9 type 2 (prealloc)
                  prealloc data disk byte 303144960 nr 12288
                  prealloc data offset 4096 nr 8192
          item 5 key (450 EXTENT_DATA 8192) itemoff 15914 itemsize 53
                  generation 9 type 2 (prealloc)
                  prealloc data disk byte 303144960 nr 12288
                  prealloc data offset 8192 nr 4096
  ...

So the real problem happened earlier: notice that items 4 (4k-12k) and 5
(8k-12k) overlap. Both are prealloc extents. Item 4 straddles i_size and
item 5 starts at i_size.

Here is the state of 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227101">SUSE bug 1227101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37370</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:5076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000004.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6166" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009871535" comment="krb5-1.20.1-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37371</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:5076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000004.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6166" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009871535" comment="krb5-1.20.1-150500.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151005" comment="krb5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37891</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000008.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6311" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000192.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8843" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000200.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9457" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000512.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2879-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020022.html" source="SUSE-SU"/>
    <description>
     urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226469">SUSE bug 1226469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877315" comment="python3-urllib3-1.25.10-150300.4.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177231" comment="python3-urllib3 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38381</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix uninit-value in nci_rx_work

syzbot reported the following uninit-value access issue [1]

nci_rx_work() parses received packet from ndev-&gt;rx_q. It should be
validated header size, payload size and total packet size before
processing the packet. If an invalid packet is detected, it should be
silently discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226878">SUSE bug 1226878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38388</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38388" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup

Use the control private_free callback to free the associated data
block. This ensures that the memory won't leak, whatever way the
control gets destroyed.

The original implementation didn't actually remove the ALSA
controls in hda_cs_dsp_control_remove(). It only freed the internal
tracking structure. This meant it was possible to remove/unload the
amp driver while leaving its ALSA controls still present in the
soundcard. Obviously attempting to access them could cause segfaults
or at least dereferencing stale pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226890">SUSE bug 1226890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38390</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38390" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails

Calling a6xx_destroy() before adreno_gpu_init() leads to a null pointer
dereference on:

msm_gpu_cleanup() : platform_set_drvdata(gpu-&gt;pdev, NULL);

as gpu-&gt;pdev is only assigned in:

a6xx_gpu_init()
|_ adreno_gpu_init
    |_ msm_gpu_init()

Instead of relying on handwavy null checks down the cleanup chain,
explicitly de-allocate the LLC data and free a6xx_gpu instead.

Patchwork: https://patchwork.freedesktop.org/patch/588919/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226891">SUSE bug 1226891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38538</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: xmit: make sure we have at least eth header len bytes

syzbot triggered an uninit value[1] error in bridge device's xmit path
by sending a short (less than ETH_HLEN bytes) skb. To fix it check if
we can actually pull that amount instead of assuming.

Tested with dropwatch:
 drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)
 origin: software
 timestamp: Mon May 13 11:31:53 2024 778214037 nsec
 protocol: 0x88a8
 length: 2
 original length: 2
 drop reason: PKT_TOO_SMALL

[1]
BUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
 netdev_start_xmit include/linux/netdevice.h:4917 [inline]
 xmit_one net/core/dev.c:3531 [inline]
 dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
 __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 __bpf_tx_skb net/core/filter.c:2136 [inline]
 __bpf_redirect_common net/core/filter.c:2180 [inline]
 __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187
 ____bpf_clone_redirect net/core/filter.c:2460 [inline]
 bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432
 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997
 __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425
 bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058
 bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269
 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765
 x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38540</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38540" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq

Undefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called
with hwq_attr-&gt;aux_depth != 0 and hwq_attr-&gt;aux_stride == 0.
In that case, "roundup_pow_of_two(hwq_attr-&gt;aux_stride)" gets called.
roundup_pow_of_two is documented as undefined for 0.

Fix it in the one caller that had this combination.

The undefined behavior was detected by UBSAN:
  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13
  shift exponent 64 is too large for 64-bit type 'long unsigned int'
  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4
  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ubsan_epilogue+0x5/0x30
   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec
   __roundup_pow_of_two+0x25/0x35 [bnxt_re]
   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]
   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]
   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __kmalloc+0x1b6/0x4f0
   ? create_qp.part.0+0x128/0x1c0 [ib_core]
   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]
   create_qp.part.0+0x128/0x1c0 [ib_core]
   ib_create_qp_kernel+0x50/0xd0 [ib_core]
   create_mad_qp+0x8e/0xe0 [ib_core]
   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]
   ib_mad_init_device+0x2be/0x680 [ib_core]
   add_client_context+0x10d/0x1a0 [ib_core]
   enable_device_and_get+0xe0/0x1d0 [ib_core]
   ib_register_device+0x53c/0x630 [ib_core]
   ? srso_alias_return_thunk+0x5/0xfbef5
   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]
   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]
   auxiliary_bus_probe+0x49/0x80
   ? driver_sysfs_add+0x57/0xc0
   really_probe+0xde/0x340
   ? pm_runtime_barrier+0x54/0x90
   ? __pfx___driver_attach+0x10/0x10
   __driver_probe_device+0x78/0x110
   driver_probe_device+0x1f/0xa0
   __driver_attach+0xba/0x1c0
   bus_for_each_dev+0x8f/0xe0
   bus_add_driver+0x146/0x220
   driver_register+0x72/0xd0
   __auxiliary_driver_register+0x6e/0xd0
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   do_one_initcall+0x5b/0x310
   do_init_module+0x90/0x250
   init_module_from_file+0x86/0xc0
   idempotent_init_module+0x121/0x2b0
   __x64_sys_finit_module+0x5e/0xb0
   do_syscall_64+0x82/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode_prepare+0x149/0x170
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode+0x75/0x230
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_syscall_64+0x8e/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __count_memcg_events+0x69/0x100
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? count_memcg_events.constprop.0+0x1a/0x30
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? handle_mm_fault+0x1f0/0x300
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_user_addr_fault+0x34e/0x640
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f4e5132821d
  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48
  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d
  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b
  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0
  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d
  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60
   &lt;/TASK&gt;
  ---[ end trace ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226582">SUSE bug 1226582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38541</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38541" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: module: add buffer overflow check in of_modalias()

In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227496">SUSE bug 1227496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38544</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38544" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt

In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the
resp_pkts queue and then a decision is made whether to run the completer
task inline or schedule it. Finally the skb is dereferenced to bump a 'hw'
performance counter. This is wrong because if the completer task is
already running in a separate thread it may have already processed the skb
and freed it which can cause a seg fault.  This has been observed
infrequently in testing at high scale.

This patch fixes this by changing the order of enqueuing the packet until
after the counter is accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226597">SUSE bug 1226597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38545</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix UAF for cq async event

The refcount of CQ is not protected by locks. When CQ asynchronous
events and CQ destruction are concurrent, CQ may have been released,
which will cause UAF.

Use the xa_lock() to protect the CQ refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38546</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: vc4: Fix possible null pointer dereference

In vc4_hdmi_audio_init() of_get_address() may return
NULL which is later dereferenced. Fix this bug by adding NULL check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226593">SUSE bug 1226593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38547</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries

The allocation failure of mycs-&gt;yuv_scaler_binary in load_video_binaries()
is followed with a dereference of mycs-&gt;yuv_scaler_binary after the
following call chain:

sh_css_pipe_load_binaries()
  |-&gt; load_video_binaries(mycs-&gt;yuv_scaler_binary == NULL)
  |
  |-&gt; sh_css_pipe_unload_binaries()
        |-&gt; unload_video_binaries()

In unload_video_binaries(), it calls to ia_css_binary_unload with argument
&amp;pipe-&gt;pipe_settings.video.yuv_scaler_binary[i], which refers to the
same memory slot as mycs-&gt;yuv_scaler_binary. Thus, a null-pointer
dereference is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226632">SUSE bug 1226632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38548</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference

In cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is
assigned to mhdp_state-&gt;current_mode, and there is a dereference of it in
drm_mode_set_name(), which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate().

Fix this bug add a check of mhdp_state-&gt;current_mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228202">SUSE bug 1228202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38549</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Add 0 size check to mtk_drm_gem_obj

Add a check to mtk_drm_gem_init if we attempt to allocate a GEM object
of 0 bytes. Currently, no such check exists and the kernel will panic if
a userspace application attempts to allocate a 0x0 GBM buffer.

Tested by attempting to allocate a 0x0 GBM buffer on an MT8188 and
verifying that we now return EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226735">SUSE bug 1226735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38550</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: kirkwood: Fix potential NULL dereference

In kirkwood_dma_hw_params() mv_mbus_dram_info() returns NULL if
CONFIG_PLAT_ORION macro is not defined.
Fix this bug by adding NULL check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226633">SUSE bug 1226633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38552</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential index out of bounds in color transformation function

Fixes index out of bounds issue in the color transformation function.
The issue could occur when the index 'i' exceeds the number of transfer
function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, an error message is
logged and the function returns false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226767">SUSE bug 1226767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38553</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fec: remove .ndo_poll_controller to avoid deadlocks

There is a deadlock issue found in sungem driver, please refer to the
commit ac0a230f719b ("eth: sungem: remove .ndo_poll_controller to avoid
deadlocks"). The root cause of the issue is that netpoll is in atomic
context and disable_irq() is called by .ndo_poll_controller interface
of sungem driver, however, disable_irq() might sleep. After analyzing
the implementation of fec_poll_controller(), the fec driver should have
the same issue. Due to the fec driver uses NAPI for TX completions, the
.ndo_poll_controller is unnecessary to be implemented in the fec driver,
so fec_poll_controller() can be safely removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226744">SUSE bug 1226744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38554</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38554" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix reference count leak issue of net_device

There is a reference count leak issue of the object "net_device" in
ax25_dev_device_down(). When the ax25 device is shutting down, the
ax25_dev_device_down() drops the reference count of net_device one
or zero times depending on if we goto unlock_put or not, which will
cause memory leak.

In order to solve the above issue, decrease the reference count of
net_device after dev-&gt;ax25_ptr is set to null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226742">SUSE bug 1226742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38555</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Discard command completions in internal error

Fix use after free when FW completion arrives while device is in
internal error state. Avoid calling completion handler in this case,
since the device will flush the command interface and trigger all
completions manually.

Kernel log:
------------[ cut here ]------------
refcount_t: underflow; use-after-free.
...
RIP: 0010:refcount_warn_saturate+0xd8/0xe0
...
Call Trace:
&lt;IRQ&gt;
? __warn+0x79/0x120
? refcount_warn_saturate+0xd8/0xe0
? report_bug+0x17c/0x190
? handle_bug+0x3c/0x60
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? refcount_warn_saturate+0xd8/0xe0
cmd_ent_put+0x13b/0x160 [mlx5_core]
mlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]
cmd_comp_notifier+0x1f/0x30 [mlx5_core]
notifier_call_chain+0x35/0xb0
atomic_notifier_call_chain+0x16/0x20
mlx5_eq_async_int+0xf6/0x290 [mlx5_core]
notifier_call_chain+0x35/0xb0
atomic_notifier_call_chain+0x16/0x20
irq_int_handler+0x19/0x30 [mlx5_core]
__handle_irq_event_percpu+0x4b/0x160
handle_irq_event+0x2e/0x80
handle_edge_irq+0x98/0x230
__common_interrupt+0x3b/0xa0
common_interrupt+0x7b/0xa0
&lt;/IRQ&gt;
&lt;TASK&gt;
asm_common_interrupt+0x22/0x40
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38556</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Add a timeout to acquire the command queue semaphore

Prevent forced completion handling on an entry that has not yet been
assigned an index, causing an out of bounds access on idx = -22.
Instead of waiting indefinitely for the sem, blocking flow now waits for
index to be allocated or a sem acquisition timeout before beginning the
timer for FW completion.

Kernel log example:
mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226774">SUSE bug 1226774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38557</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38557" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Reload only IB representors upon lag disable/enable

On lag disable, the bond IB device along with all of its
representors are destroyed, and then the slaves' representors get reloaded.

In case the slave IB representor load fails, the eswitch error flow
unloads all representors, including ethernet representors, where the
netdevs get detached and removed from lag bond. Such flow is inaccurate
as the lag driver is not responsible for loading/unloading ethernet
representors. Furthermore, the flow described above begins by holding
lag lock to prevent bond changes during disable flow. However, when
reaching the ethernet representors detachment from lag, the lag lock is
required again, triggering the following deadlock:

Call trace:
__switch_to+0xf4/0x148
__schedule+0x2c8/0x7d0
schedule+0x50/0xe0
schedule_preempt_disabled+0x18/0x28
__mutex_lock.isra.13+0x2b8/0x570
__mutex_lock_slowpath+0x1c/0x28
mutex_lock+0x4c/0x68
mlx5_lag_remove_netdev+0x3c/0x1a0 [mlx5_core]
mlx5e_uplink_rep_disable+0x70/0xa0 [mlx5_core]
mlx5e_detach_netdev+0x6c/0xb0 [mlx5_core]
mlx5e_netdev_change_profile+0x44/0x138 [mlx5_core]
mlx5e_netdev_attach_nic_profile+0x28/0x38 [mlx5_core]
mlx5e_vport_rep_unload+0x184/0x1b8 [mlx5_core]
mlx5_esw_offloads_rep_load+0xd8/0xe0 [mlx5_core]
mlx5_eswitch_reload_reps+0x74/0xd0 [mlx5_core]
mlx5_disable_lag+0x130/0x138 [mlx5_core]
mlx5_lag_disable_change+0x6c/0x70 [mlx5_core] // hold ldev-&gt;lock
mlx5_devlink_eswitch_mode_set+0xc0/0x410 [mlx5_core]
devlink_nl_cmd_eswitch_set_doit+0xdc/0x180
genl_family_rcv_msg_doit.isra.17+0xe8/0x138
genl_rcv_msg+0xe4/0x220
netlink_rcv_skb+0x44/0x108
genl_rcv+0x40/0x58
netlink_unicast+0x198/0x268
netlink_sendmsg+0x1d4/0x418
sock_sendmsg+0x54/0x60
__sys_sendto+0xf4/0x120
__arm64_sys_sendto+0x30/0x40
el0_svc_common+0x8c/0x120
do_el0_svc+0x30/0xa0
el0_svc+0x20/0x30
el0_sync_handler+0x90/0xb8
el0_sync+0x160/0x180

Thus, upon lag enable/disable, load and unload only the IB representors
of the slaves preventing the deadlock mentioned above.

While at it, refactor the mlx5_esw_offloads_rep_load() function to have
a static helper method for its internal logic, in symmetry with the
representor unload design.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226781">SUSE bug 1226781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38558</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix overwriting ct original tuple for ICMPv6

OVS_PACKET_CMD_EXECUTE has 3 main attributes:
 - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.
 - OVS_PACKET_ATTR_PACKET - Binary packet content.
 - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.

OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure
with the metadata like conntrack state, input port, recirculation id,
etc.  Then the packet itself gets parsed to populate the rest of the
keys from the packet headers.

Whenever the packet parsing code starts parsing the ICMPv6 header, it
first zeroes out fields in the key corresponding to Neighbor Discovery
information even if it is not an ND packet.

It is an 'ipv6.nd' field.  However, the 'ipv6' is a union that shares
the space between 'nd' and 'ct_orig' that holds the original tuple
conntrack metadata parsed from the OVS_PACKET_ATTR_KEY.

ND packets should not normally have conntrack state, so it's fine to
share the space, but normal ICMPv6 Echo packets or maybe other types of
ICMPv6 can have the state attached and it should not be overwritten.

The issue results in all but the last 4 bytes of the destination
address being wiped from the original conntrack tuple leading to
incorrect packet matching and potentially executing wrong actions
in case this packet recirculates within the datapath or goes back
to userspace.

ND fields should not be accessed in non-ND packets, so not clearing
them should be fine.  Executing memset() only for actual ND packets to
avoid the issue.

Initializing the whole thing before parsing is needed because ND packet
may not contain all the options.

The issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't
affect packets entering OVS datapath from network interfaces, because
in this case CT metadata is populated from skb after the packet is
already parsed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226783">SUSE bug 1226783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38559</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count from
userspace to that buffer. Later, we use kstrtouint on this buffer but we
don't ensure that the string is terminated inside the buffer, this can
lead to OOB read when using kstrtouint. Fix this issue by using
memdup_user_nul instead of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227495">SUSE bug 1227495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38560</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul instead
of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227319">SUSE bug 1227319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE

bpf_prog_attach uses attach_type_to_prog_type to enforce proper
attach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses
bpf_prog_get and relies on bpf_prog_attach_check_attach_type
to properly verify prog_type &lt;&gt; attach_type association.

Add missing attach_type enforcement for the link_create case.
Otherwise, it's currently possible to attach cgroup_skb prog
types to other cgroup hooks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228730">SUSE bug 1228730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38565</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ar5523: enable proper endpoint verification

Syzkaller reports [1] hitting a warning about an endpoint in use
not having an expected type to it.

Fix the issue by checking for the existence of all proper
endpoints with their according types intact.

Sadly, this patch has not been tested on real hardware.

[1] Syzkaller report:
------------[ cut here ]------------
usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 &lt;TASK&gt;
 ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275
 ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]
 ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]
 ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655
 usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:560 [inline]
 really_probe+0x249/0xb90 drivers/base/dd.c:639
 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808
 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936
 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427
 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008
 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487
 device_add+0xbd9/0x1e90 drivers/base/core.c:3517
 usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170
 usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238
 usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293
 call_driver_probe drivers/base/dd.c:560 [inline]
 really_probe+0x249/0xb90 drivers/base/dd.c:639
 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808
 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936
 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427
 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008
 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487
 device_add+0xbd9/0x1e90 drivers/base/core.c:3517
 usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573
 hub_port_connect drivers/usb/core/hub.c:5353 [inline]
 hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]
 port_event drivers/usb/core/hub.c:5653 [inline]
 hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735
 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
 worker_thread+0x669/0x1090 kernel/workqueue.c:2436
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226747">SUSE bug 1226747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38567</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38567" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38567" ref_url="https://www.suse.com/security/cve/CVE-2024-38567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: add a proper sanity check for endpoints

Syzkaller reports [1] hitting a warning which is caused by presence
of a wrong endpoint type at the URB sumbitting stage. While there
was a check for a specific 4th endpoint, since it can switch types
between bulk and interrupt, other endpoints are trusted implicitly.
Similar warning is triggered in a couple of other syzbot issues [2].

Fix the issue by doing a comprehensive check of all endpoints
taking into account difference between high- and full-speed
configuration.

[1] Syzkaller report:
...
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 &lt;TASK&gt;
 carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504
 carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]
 carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]
 carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028
 request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107
 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
 worker_thread+0x669/0x1090 kernel/workqueue.c:2436
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 &lt;/TASK&gt;

[2] Related syzkaller crashes:
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38567/">CVE-2024-38567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226769">SUSE bug 1226769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38568</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38568" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group

The perf tool allows users to create event groups through following
cmd [1], but the driver does not check whether the array index is out
of bounds when writing data to the event_group array. If the number of
events in an event_group is greater than HNS3_PMU_MAX_HW_EVENTS, the
memory write overflow of event_group array occurs.

Add array index check to fix the possible array out of bounds violation,
and return directly when write new events are written to array bounds.

There are 9 different events in an event_group.
[1] perf stat -e '{pmu/event1/, ... ,pmu/event9/}
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226771">SUSE bug 1226771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38570</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix potential glock use-after-free on unmount

When a DLM lockspace is released and there ares still locks in that
lockspace, DLM will unlock those locks automatically.  Commit
fb6791d100d1b started exploiting this behavior to speed up filesystem
unmount: gfs2 would simply free glocks it didn't want to unlock and then
release the lockspace.  This didn't take the bast callbacks for
asynchronous lock contention notifications into account, which remain
active until until a lock is unlocked or its lockspace is released.

To prevent those callbacks from accessing deallocated objects, put the
glocks that should not be unlocked on the sd_dead_glocks list, release
the lockspace, and only then free those glocks.

As an additional measure, ignore unexpected ast and bast callbacks if
the receiving glock is dead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226775">SUSE bug 1226775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38571</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/tsens: Fix null pointer dereference

compute_intercept_slope() is called from calibrate_8960() (in tsens-8960.c)
as compute_intercept_slope(priv, p1, NULL, ONE_PT_CALIB) which lead to null
pointer dereference (if DEBUG or DYNAMIC_DEBUG set).
Fix this bug by adding null pointer check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226737">SUSE bug 1226737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38573</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cppc_cpufreq: Fix possible null pointer dereference

cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from
different places with various parameters. So cpufreq_cpu_get() can return
null as 'policy' in some circumstances.
Fix this bug by adding null return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226739">SUSE bug 1226739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38577</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow

There is a possibility of buffer overflow in
show_rcu_tasks_trace_gp_kthread() if counters, passed
to sprintf() are huge. Counter numbers, needed for this
are unrealistically high, but buffer overflow is still
possible.

Use snprintf() with buffer size instead of sprintf().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38578</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ecryptfs: Fix buffer size for tag 66 packet

The 'TAG 66 Packet Format' description is missing the cipher code and
checksum fields that are packed into the message packet. As a result,
the buffer allocated for the packet is 3 bytes too small and
write_tag_66_packet() will write up to 3 bytes past the end of the
buffer.

Fix this by increasing the size of the allocation so the whole packet
will always fit in the buffer.

This fixes the below kasan slab-out-of-bounds bug:

  BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0
  Write of size 1 at addr ffff88800afbb2a5 by task touch/181

  CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x4c/0x70
   print_report+0xc5/0x610
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   ? kasan_complete_mode_report_info+0x44/0x210
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   kasan_report+0xc2/0x110
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   __asan_store1+0x62/0x80
   ecryptfs_generate_key_packet_set+0x7d6/0xde0
   ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10
   ? __alloc_pages+0x2e2/0x540
   ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d]
   ? dentry_open+0x8f/0xd0
   ecryptfs_write_metadata+0x30a/0x550
   ? __pfx_ecryptfs_write_metadata+0x10/0x10
   ? ecryptfs_get_lower_file+0x6b/0x190
   ecryptfs_initialize_file+0x77/0x150
   ecryptfs_create+0x1c2/0x2f0
   path_openat+0x17cf/0x1ba0
   ? __pfx_path_openat+0x10/0x10
   do_filp_open+0x15e/0x290
   ? __pfx_do_filp_open+0x10/0x10
   ? __kasan_check_write+0x18/0x30
   ? _raw_spin_lock+0x86/0xf0
   ? __pfx__raw_spin_lock+0x10/0x10
   ? __kasan_check_write+0x18/0x30
   ? alloc_fd+0xf4/0x330
   do_sys_openat2+0x122/0x160
   ? __pfx_do_sys_openat2+0x10/0x10
   __x64_sys_openat+0xef/0x170
   ? __pfx___x64_sys_openat+0x10/0x10
   do_syscall_64+0x60/0xd0
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8
  RIP: 0033:0x7f00a703fd67
  Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f
  RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
  RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67
  RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c
  RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000
  R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941
  R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040
   &lt;/TASK&gt;

  Allocated by task 181:
   kasan_save_stack+0x2f/0x60
   kasan_set_track+0x29/0x40
   kasan_save_alloc_info+0x25/0x40
   __kasan_kmalloc+0xc5/0xd0
   __kmalloc+0x66/0x160
   ecryptfs_generate_key_packet_set+0x6d2/0xde0
   ecryptfs_write_metadata+0x30a/0x550
   ecryptfs_initialize_file+0x77/0x150
   ecryptfs_create+0x1c2/0x2f0
   path_openat+0x17cf/0x1ba0
   do_filp_open+0x15e/0x290
   do_sys_openat2+0x122/0x160
   __x64_sys_openat+0xef/0x170
   do_syscall_64+0x60/0xd0
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38579</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: bcm - Fix pointer arithmetic

In spu2_dump_omd() value of ptr is increased by ciph_key_len
instead of hash_iv_len which could lead to going beyond the
buffer boundaries.
Fix this bug by changing ciph_key_len to hash_iv_len.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226637">SUSE bug 1226637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38580</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

epoll: be better about file lifetimes

epoll can call out to vfs_poll() with a file pointer that may race with
the last 'fput()'. That would make f_count go down to zero, and while
the ep-&gt;mtx locking means that the resulting file pointer tear-down will
be blocked until the poll returns, it means that f_count is already
dead, and any use of it won't actually get a reference to the file any
more: it's dead regardless.

Make sure we have a valid ref on the file pointer before we call down to
vfs_poll() from the epoll routines.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226610">SUSE bug 1226610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38581</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38581" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/mes: fix use-after-free issue

Delete fence fallback timer to fix the ramdom
use-after-free issue.

v2: move to amdgpu_mes.c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226657">SUSE bug 1226657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38582</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential hang in nilfs_detach_log_writer()

Syzbot has reported a potential hang in nilfs_detach_log_writer() called
during nilfs2 unmount.

Analysis revealed that this is because nilfs_segctor_sync(), which
synchronizes with the log writer thread, can be called after
nilfs_segctor_destroy() terminates that thread, as shown in the call trace
below:

nilfs_detach_log_writer
  nilfs_segctor_destroy
    nilfs_segctor_kill_thread  --&gt; Shut down log writer thread
    flush_work
      nilfs_iput_work_func
        nilfs_dispose_list
          iput
            nilfs_evict_inode
              nilfs_transaction_commit
                nilfs_construct_segment (if inode needs sync)
                  nilfs_segctor_sync  --&gt; Attempt to synchronize with
                                          log writer thread
                           *** DEADLOCK ***

Fix this issue by changing nilfs_segctor_sync() so that the log writer
thread returns normally without synchronizing after it terminates, and by
forcing tasks that are already waiting to complete once after the thread
terminates.

The skipped inode metadata flushout will then be processed together in the
subsequent cleanup work in nilfs_segctor_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226658">SUSE bug 1226658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38583</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix use-after-free of timer for log writer thread

Patch series "nilfs2: fix log writer related issues".

This bug fix series covers three nilfs2 log writer-related issues,
including a timer use-after-free issue and potential deadlock issue on
unmount, and a potential freeze issue in event synchronization found
during their analysis.  Details are described in each commit log.


This patch (of 3):

A use-after-free issue has been reported regarding the timer sc_timer on
the nilfs_sc_info structure.

The problem is that even though it is used to wake up a sleeping log
writer thread, sc_timer is not shut down until the nilfs_sc_info structure
is about to be freed, and is used regardless of the thread's lifetime.

Fix this issue by limiting the use of sc_timer only while the log writer
thread is alive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226777">SUSE bug 1226777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227286">SUSE bug 1227286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38586</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: Fix possible ring buffer corruption on fragmented Tx packets.

An issue was found on the RTL8125b when transmitting small fragmented
packets, whereby invalid entries were inserted into the transmit ring
buffer, subsequently leading to calls to dma_unmap_single() with a null
address.

This was caused by rtl8169_start_xmit() not noticing changes to nr_frags
which may occur when small packets are padded (to work around hardware
quirks) in rtl8169_tso_csum_v2().

To fix this, postpone inspecting nr_frags until after any padding has been
applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226750">SUSE bug 1226750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38587</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

speakup: Fix sizeof() vs ARRAY_SIZE() bug

The "buf" pointer is an array of u16 values.  This code should be
using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),
otherwise it can the still got out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226780">SUSE bug 1226780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38588</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix possible use-after-free issue in ftrace_location()

KASAN reports a bug:

  BUG: KASAN: use-after-free in ftrace_location+0x90/0x120
  Read of size 8 at addr ffff888141d40010 by task insmod/424
  CPU: 8 PID: 424 Comm: insmod Tainted: G        W          6.9.0-rc2+
  [...]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x68/0xa0
   print_report+0xcf/0x610
   kasan_report+0xb5/0xe0
   ftrace_location+0x90/0x120
   register_kprobe+0x14b/0xa40
   kprobe_init+0x2d/0xff0 [kprobe_example]
   do_one_initcall+0x8f/0x2d0
   do_init_module+0x13a/0x3c0
   load_module+0x3082/0x33d0
   init_module_from_file+0xd2/0x130
   __x64_sys_finit_module+0x306/0x440
   do_syscall_64+0x68/0x140
   entry_SYSCALL_64_after_hwframe+0x71/0x79

The root cause is that, in lookup_rec(), ftrace record of some address
is being searched in ftrace pages of some module, but those ftrace pages
at the same time is being freed in ftrace_release_mod() as the
corresponding module is being deleted:

           CPU1                       |      CPU2
  register_kprobes() {                | delete_module() {
    check_kprobe_address_safe() {     |
      arch_check_ftrace_location() {  |
        ftrace_location() {           |
          lookup_rec() // USE!        |   ftrace_release_mod() // Free!

To fix this issue:
  1. Hold rcu lock as accessing ftrace pages in ftrace_location_range();
  2. Use ftrace_location_range() instead of lookup_rec() in
     ftrace_location();
  3. Call synchronize_rcu() before freeing any ftrace pages both in
     ftrace_process_locs()/ftrace_release_mod()/ftrace_free_mem().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226837">SUSE bug 1226837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38589</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38589" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38589" ref_url="https://www.suse.com/security/cve/CVE-2024-38589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netrom: fix possible dead-lock in nr_rt_ioctl()

syzbot loves netrom, and found a possible deadlock in nr_rt_ioctl [1]

Make sure we always acquire nr_node_list_lock before nr_node_lock(nr_node)

[1]
WARNING: possible circular locking dependency detected
6.9.0-rc7-syzkaller-02147-g654de42f3fc6 #0 Not tainted
------------------------------------------------------
syz-executor350/5129 is trying to acquire lock:
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_node_lock include/net/netrom.h:152 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:464 [inline]
 ffff8880186e2070 (&amp;nr_node-&gt;node_lock){+...}-{2:2}, at: nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697

but task is already holding lock:
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]
 ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_rt_ioctl+0x10a/0x1090 net/netrom/nr_route.c:697

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (nr_node_list_lock){+...}-{2:2}:
        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
        __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
        _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
        spin_lock_bh include/linux/spinlock.h:356 [inline]
        nr_remove_node net/netrom/nr_route.c:299 [inline]
        nr_del_node+0x4b4/0x820 net/netrom/nr_route.c:355
        nr_rt_ioctl+0xa95/0x1090 net/netrom/nr_route.c:683
        sock_do_ioctl+0x158/0x460 net/socket.c:1222
        sock_ioctl+0x629/0x8e0 net/socket.c:1341
        vfs_ioctl fs/ioctl.c:51 [inline]
        __do_sys_ioctl fs/ioctl.c:904 [inline]
        __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-&gt; #0 (&amp;nr_node-&gt;node_lock){+...}-{2:2}:
        check_prev_add kernel/locking/lockdep.c:3134 [inline]
        check_prevs_add kernel/locking/lockdep.c:3253 [inline]
        validate_chain+0x18cb/0x58e0 kernel/locking/lockdep.c:3869
        __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
        __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
        _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
        spin_lock_bh include/linux/spinlock.h:356 [inline]
        nr_node_lock include/net/netrom.h:152 [inline]
        nr_dec_obs net/netrom/nr_route.c:464 [inline]
        nr_rt_ioctl+0x1bb/0x1090 net/netrom/nr_route.c:697
        sock_do_ioctl+0x158/0x460 net/socket.c:1222
        sock_ioctl+0x629/0x8e0 net/socket.c:1341
        vfs_ioctl fs/ioctl.c:51 [inline]
        __do_sys_ioctl fs/ioctl.c:904 [inline]
        __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(nr_node_list_lock);
                               lock(&amp;nr_node-&gt;node_lock);
                               lock(nr_node_list_lock);
  lock(&amp;nr_node-&gt;node_lock);

 *** DEADLOCK ***

1 lock held by syz-executor350/5129:
  #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
  #0: ffffffff8f7053b8 (nr_node_list_lock){+...}-{2:2}, at: nr_dec_obs net/netrom/nr_route.c:462 [inline]
  #0: ffffffff8f70
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38589/">CVE-2024-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38589">CVE-2024-38589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226748">SUSE bug 1226748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38590</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Modify the print level of CQE error

Too much print may lead to a panic in kernel. Change ibdev_err() to
ibdev_err_ratelimited(), and change the printing level of cqe dump
to debug level.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226839">SUSE bug 1226839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38591</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix deadlock on SRQ async events.

xa_lock for SRQ table may be required in AEQ. Use xa_store_irq()/
xa_erase_irq() to avoid deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226738">SUSE bug 1226738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38594</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38594" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: move the EST lock to struct stmmac_priv

Reinitialize the whole EST structure would also reset the mutex
lock which is embedded in the EST structure, and then trigger
the following warning. To address this, move the lock to struct
stmmac_priv. We also need to reacquire the mutex lock when doing
this initialization.

DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
WARNING: CPU: 3 PID: 505 at kernel/locking/mutex.c:587 __mutex_lock+0xd84/0x1068
 Modules linked in:
 CPU: 3 PID: 505 Comm: tc Not tainted 6.9.0-rc6-00053-g0106679839f7-dirty #29
 Hardware name: NXP i.MX8MPlus EVK board (DT)
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __mutex_lock+0xd84/0x1068
 lr : __mutex_lock+0xd84/0x1068
 sp : ffffffc0864e3570
 x29: ffffffc0864e3570 x28: ffffffc0817bdc78 x27: 0000000000000003
 x26: ffffff80c54f1808 x25: ffffff80c9164080 x24: ffffffc080d723ac
 x23: 0000000000000000 x22: 0000000000000002 x21: 0000000000000000
 x20: 0000000000000000 x19: ffffffc083bc3000 x18: ffffffffffffffff
 x17: ffffffc08117b080 x16: 0000000000000002 x15: ffffff80d2d40000
 x14: 00000000000002da x13: ffffff80d2d404b8 x12: ffffffc082b5a5c8
 x11: ffffffc082bca680 x10: ffffffc082bb2640 x9 : ffffffc082bb2698
 x8 : 0000000000017fe8 x7 : c0000000ffffefff x6 : 0000000000000001
 x5 : ffffff8178fe0d48 x4 : 0000000000000000 x3 : 0000000000000027
 x2 : ffffff8178fe0d50 x1 : 0000000000000000 x0 : 0000000000000000
 Call trace:
  __mutex_lock+0xd84/0x1068
  mutex_lock_nested+0x28/0x34
  tc_setup_taprio+0x118/0x68c
  stmmac_setup_tc+0x50/0xf0
  taprio_change+0x868/0xc9c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226734">SUSE bug 1226734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38596</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg

A data-race condition has been identified in af_unix. In one data path,
the write function unix_release_sock() atomically writes to
sk-&gt;sk_shutdown using WRITE_ONCE. However, on the reader side,
unix_stream_sendmsg() does not read it atomically. Consequently, this
issue is causing the following KCSAN splat to occur:

	BUG: KCSAN: data-race in unix_release_sock / unix_stream_sendmsg

	write (marked) to 0xffff88867256ddbb of 1 bytes by task 7270 on cpu 28:
	unix_release_sock (net/unix/af_unix.c:640)
	unix_release (net/unix/af_unix.c:1050)
	sock_close (net/socket.c:659 net/socket.c:1421)
	__fput (fs/file_table.c:422)
	__fput_sync (fs/file_table.c:508)
	__se_sys_close (fs/open.c:1559 fs/open.c:1541)
	__x64_sys_close (fs/open.c:1541)
	x64_sys_call (arch/x86/entry/syscall_64.c:33)
	do_syscall_64 (arch/x86/entry/common.c:?)
	entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

	read to 0xffff88867256ddbb of 1 bytes by task 989 on cpu 14:
	unix_stream_sendmsg (net/unix/af_unix.c:2273)
	__sock_sendmsg (net/socket.c:730 net/socket.c:745)
	____sys_sendmsg (net/socket.c:2584)
	__sys_sendmmsg (net/socket.c:2638 net/socket.c:2724)
	__x64_sys_sendmmsg (net/socket.c:2753 net/socket.c:2750 net/socket.c:2750)
	x64_sys_call (arch/x86/entry/syscall_64.c:33)
	do_syscall_64 (arch/x86/entry/common.c:?)
	entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

	value changed: 0x01 -&gt; 0x03

The line numbers are related to commit dd5a440a31fa ("Linux 6.9-rc7").

Commit e1d09c2c2f57 ("af_unix: Fix data races around sk-&gt;sk_shutdown.")
addressed a comparable issue in the past regarding sk-&gt;sk_shutdown.
However, it overlooked resolving this particular data path.
This patch only offending unix_stream_sendmsg() function, since the
other reads seem to be protected by unix_state_lock() as discussed in
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226846">SUSE bug 1226846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38597</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eth: sungem: remove .ndo_poll_controller to avoid deadlocks

Erhard reports netpoll warnings from sungem:

  netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)
  WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c

gem_poll_controller() disables interrupts, which may sleep.
We can't sleep in netpoll, it has interrupts disabled completely.
Strangely, gem_poll_controller() doesn't even poll the completions,
and instead acts as if an interrupt has fired so it just schedules
NAPI and exits. None of this has been necessary for years, since
netpoll invokes NAPI directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226749">SUSE bug 1226749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38598</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix resync softlockup when bitmap size is less than array size

Is is reported that for dm-raid10, lvextend + lvchange --syncaction will
trigger following softlockup:

kernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]
CPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1
RIP: 0010:_raw_spin_unlock_irq+0x13/0x30
Call Trace:
 &lt;TASK&gt;
 md_bitmap_start_sync+0x6b/0xf0
 raid10_sync_request+0x25c/0x1b40 [raid10]
 md_do_sync+0x64b/0x1020
 md_thread+0xa7/0x170
 kthread+0xcf/0x100
 ret_from_fork+0x30/0x50
 ret_from_fork_asm+0x1a/0x30

And the detailed process is as follows:

md_do_sync
 j = mddev-&gt;resync_min
 while (j &lt; max_sectors)
  sectors = raid10_sync_request(mddev, j, &amp;skipped)
   if (!md_bitmap_start_sync(..., &amp;sync_blocks))
    // md_bitmap_start_sync set sync_blocks to 0
    return sync_blocks + sectors_skippe;
  // sectors = 0;
  j += sectors;
  // j never change

Root cause is that commit 301867b1c168 ("md/raid10: check
slab-out-of-bounds in md_bitmap_get_counter") return early from
md_bitmap_get_counter(), without setting returned blocks.

Fix this problem by always set returned blocks from
md_bitmap_get_counter"(), as it used to be.

Noted that this patch just fix the softlockup problem in kernel, the
case that bitmap size doesn't match array size still need to be fixed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226757">SUSE bug 1226757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38599</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jffs2: prevent xattr node from overflowing the eraseblock

Add a check to make sure that the requested xattr node size is no larger
than the eraseblock minus the cleanmarker.

Unlike the usual inode nodes, the xattr nodes aren't split into parts
and spread across multiple eraseblocks, which means that a xattr node
must not occupy more than one eraseblock. If the requested xattr value is
too large, the xattr node can spill onto the next eraseblock, overwriting
the nodes and causing errors such as:

jffs2: argh. node added in wrong place at 0x0000b050(2)
jffs2: nextblock 0x0000a000, expected at 0000b00c
jffs2: error: (823) do_verify_xattr_datum: node CRC failed at 0x01e050,
read=0xfc892c93, calc=0x000000
jffs2: notice: (823) jffs2_get_inode_nodes: Node header CRC failed
at 0x01e00c. {848f,2fc4,0fef511f,59a3d171}
jffs2: Node at 0x0000000c with length 0x00001044 would run over the
end of the erase block
jffs2: Perhaps the file system was created with the wrong erase size?
jffs2: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found
at 0x00000010: 0x1044 instead

This breaks the filesystem and can lead to KASAN crashes such as:

BUG: KASAN: slab-out-of-bounds in jffs2_sum_add_kvec+0x125e/0x15d0
Read of size 4 at addr ffff88802c31e914 by task repro/830
CPU: 0 PID: 830 Comm: repro Not tainted 6.9.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS Arch Linux 1.16.3-1-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xc4/0x620
 ? __virt_addr_valid+0x308/0x5b0
 kasan_report+0xc1/0xf0
 ? jffs2_sum_add_kvec+0x125e/0x15d0
 ? jffs2_sum_add_kvec+0x125e/0x15d0
 jffs2_sum_add_kvec+0x125e/0x15d0
 jffs2_flash_direct_writev+0xa8/0xd0
 jffs2_flash_writev+0x9c9/0xef0
 ? __x64_sys_setxattr+0xc4/0x160
 ? do_syscall_64+0x69/0x140
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 [...]

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227283">SUSE bug 1227283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38600</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: Fix deadlocks with kctl removals at disconnection

In snd_card_disconnect(), we set card-&gt;shutdown flag at the beginning,
call callbacks and do sync for card-&gt;power_ref_sleep waiters at the
end.  The callback may delete a kctl element, and this can lead to a
deadlock when the device was in the suspended state.  Namely:

* A process waits for the power up at snd_power_ref_and_wait() in
  snd_ctl_info() or read/write() inside card-&gt;controls_rwsem.

* The system gets disconnected meanwhile, and the driver tries to
  delete a kctl via snd_ctl_remove*(); it tries to take
  card-&gt;controls_rwsem again, but this is already locked by the
  above.  Since the sleeper isn't woken up, this deadlocks.

An easy fix is to wake up sleepers before processing the driver
disconnect callbacks but right after setting the card-&gt;shutdown flag.
Then all sleepers will abort immediately, and the code flows again.

So, basically this patch moves the wait_event() call at the right
timing.  While we're at it, just to be sure, call wait_event_all()
instead of wait_event(), although we don't use exclusive events on
this queue for now.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226864">SUSE bug 1226864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38601</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix a race between readers and resize checks

The reader code in rb_get_reader_page() swaps a new reader page into the
ring buffer by doing cmpxchg on old-&gt;list.prev-&gt;next to point it to the
new page. Following that, if the operation is successful,
old-&gt;list.next-&gt;prev gets updated too. This means the underlying
doubly-linked list is temporarily inconsistent, page-&gt;prev-&gt;next or
page-&gt;next-&gt;prev might not be equal back to page for some page in the
ring buffer.

The resize operation in ring_buffer_resize() can be invoked in parallel.
It calls rb_check_pages() which can detect the described inconsistency
and stop further tracing:

[  190.271762] ------------[ cut here ]------------
[  190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0
[  190.271789] Modules linked in: [...]
[  190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1
[  190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G            E      6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f
[  190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014
[  190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0
[  190.272023] Code: [...]
[  190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206
[  190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80
[  190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700
[  190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000
[  190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720
[  190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000
[  190.272053] FS:  00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000
[  190.272057] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0
[  190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  190.272077] Call Trace:
[  190.272098]  &lt;TASK&gt;
[  190.272189]  ring_buffer_resize+0x2ab/0x460
[  190.272199]  __tracing_resize_ring_buffer.part.0+0x23/0xa0
[  190.272206]  tracing_resize_ring_buffer+0x65/0x90
[  190.272216]  tracing_entries_write+0x74/0xc0
[  190.272225]  vfs_write+0xf5/0x420
[  190.272248]  ksys_write+0x67/0xe0
[  190.272256]  do_syscall_64+0x82/0x170
[  190.272363]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  190.272373] RIP: 0033:0x7f1bd657d263
[  190.272381] Code: [...]
[  190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263
[  190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001
[  190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000
[  190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500
[  190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002
[  190.272412]  &lt;/TASK&gt;
[  190.272414] ---[ end trace 0000000000000000 ]---

Note that ring_buffer_resize() calls rb_check_pages() only if the parent
trace_buffer has recording disabled. Recent commit d78ab792705c
("tracing: Stop current tracer when resizing buffer") causes that it is
now always the case which makes it more likely to experience this issue.

The window to hit this race is nonetheless very small. To help
reproducing it, one can add a delay loop in rb_get_reader_page():

 ret = rb_head_page_replace(reader, cpu_buffer-&gt;reader_page);
 if (!ret)
 	goto spin;
 for (unsigned i = 0; i &lt; 1U &lt;&lt; 26; i++)  /* inserted delay loop */
 	__asm__ __volatile__ ("" : : : "memory");
 rb_list_head(reader-&gt;list.next)-&gt;prev = &amp;cpu_buffer-&gt;reader_page-&gt;list;

.. 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226876">SUSE bug 1226876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix reference count leak issues of ax25_dev

The ax25_addr_ax25dev() and ax25_dev_device_down() exist a reference
count leak issue of the object "ax25_dev".

Memory leak issue in ax25_addr_ax25dev():

The reference count of the object "ax25_dev" can be increased multiple
times in ax25_addr_ax25dev(). This will cause a memory leak.

Memory leak issues in ax25_dev_device_down():

The reference count of ax25_dev is set to 1 in ax25_dev_device_up() and
then increase the reference count when ax25_dev is added to ax25_dev_list.
As a result, the reference count of ax25_dev is 2. But when the device is
shutting down. The ax25_dev_device_down() drops the reference count once
or twice depending on if we goto unlock_put or not, which will cause
memory leak.

As for the issue of ax25_addr_ax25dev(), it is impossible for one pointer
to be on a list twice. So add a break in ax25_addr_ax25dev(). As for the
issue of ax25_dev_device_down(), increase the reference count of ax25_dev
once in ax25_dev_device_up() and decrease the reference count of ax25_dev
after it is removed from the ax25_dev_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226613">SUSE bug 1226613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38603</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset()

pci_alloc_irq_vectors() allocates an irq vector. When devm_add_action()
fails, the irq vector is not freed, which leads to a memory leak.

Replace the devm_add_action with devm_add_action_or_reset to ensure
the irq vector can be destroyed when it fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226842">SUSE bug 1226842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38605</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: core: Fix NULL module pointer assignment at card init

The commit 81033c6b584b ("ALSA: core: Warn on empty module")
introduced a WARN_ON() for a NULL module pointer passed at snd_card
object creation, and it also wraps the code around it with '#ifdef
MODULE'.  This works in most cases, but the devils are always in
details.  "MODULE" is defined when the target code (i.e. the sound
core) is built as a module; but this doesn't mean that the caller is
also built-in or not.  Namely, when only the sound core is built-in
(CONFIG_SND=y) while the driver is a module (CONFIG_SND_USB_AUDIO=m),
the passed module pointer is ignored even if it's non-NULL, and
card-&gt;module remains as NULL.  This would result in the missing module
reference up/down at the device open/close, leading to a race with the
code execution after the module removal.

For addressing the bug, move the assignment of card-&gt;module again out
of ifdef.  The WARN_ON() is still wrapped with ifdef because the
module can be really NULL when all sound drivers are built-in.

Note that we keep 'ifdef MODULE' for WARN_ON(), otherwise it would
lead to a false-positive NULL module check.  Admittedly it won't catch
perfectly, i.e. no check is performed when CONFIG_SND=y.  But, it's no
real problem as it's only for debugging, and the condition is pretty
rare.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226740">SUSE bug 1226740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38608</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix netif state handling

mlx5e_suspend cleans resources only if netif_device_present() returns
true. However, mlx5e_resume changes the state of netif, via
mlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.
In the below case, the above leads to NULL-ptr Oops[1] and memory
leaks:

mlx5e_probe
 _mlx5e_resume
  mlx5e_attach_netdev
   mlx5e_nic_enable  &lt;-- netdev not reg, not calling netif_device_attach()
  register_netdev &lt;-- failed for some reason.
ERROR_FLOW:
 _mlx5e_suspend &lt;-- netif_device_present return false, resources aren't freed :(

Hence, clean resources in this case as well.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at0xffffffffffffffd6.
RSP: 0018:ffff888178aaf758 EFLAGS: 00010246
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x14c/0x3c0
 ? exc_page_fault+0x75/0x140
 ? asm_exc_page_fault+0x22/0x30
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]
 mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]
 mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]
 __mlx5_ib_add+0x34/0xd0 [mlx5_ib]
 mlx5r_probe+0xe1/0x210 [mlx5_ib]
 ? auxiliary_match_id+0x6a/0x90
 auxiliary_bus_probe+0x38/0x80
 ? driver_sysfs_add+0x51/0x80
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x637/0x840
 __auxiliary_device_add+0x3b/0xa0
 add_adev+0xc9/0x140 [mlx5_core]
 mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]
 mlx5_register_device+0x53/0xa0 [mlx5_core]
 mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]
 mlx5_init_one+0x3b/0x60 [mlx5_core]
 probe_one+0x44c/0x730 [mlx5_core]
 local_pci_probe+0x3e/0x90
 pci_device_probe+0xbf/0x210
 ? kernfs_create_link+0x5d/0xa0
 ? sysfs_do_create_link_sd+0x60/0xc0
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 pci_bus_add_device+0x54/0x80
 pci_iov_add_virtfn+0x2e6/0x320
 sriov_enable+0x208/0x420
 mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]
 sriov_numvfs_store+0xae/0x1a0
 kernfs_fop_write_iter+0x10c/0x1a0
 vfs_write+0x291/0x3c0
 ksys_write+0x5f/0xe0
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
 CR2: 0000000000000000
 ---[ end trace 0000000000000000  ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226746">SUSE bug 1226746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: exit() callback is optional

The exit() callback is optional and shouldn't be called without checking
a valid pointer first.

Also, we must clear freq_table pointer even if the exit() callback isn't
present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226592">SUSE bug 1226592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38616</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: re-fix fortified-memset warning

The carl9170_tx_release() function sometimes triggers a fortified-memset
warning in my randconfig builds:

In file included from include/linux/string.h:254,
                 from drivers/net/wireless/ath/carl9170/tx.c:40:
In function 'fortify_memset_chk',
    inlined from 'carl9170_tx_release' at drivers/net/wireless/ath/carl9170/tx.c:283:2,
    inlined from 'kref_put' at include/linux/kref.h:65:3,
    inlined from 'carl9170_tx_put_skb' at drivers/net/wireless/ath/carl9170/tx.c:342:9:
include/linux/fortify-string.h:493:25: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning]
  493 |                         __write_overflow_field(p_size_field, size);

Kees previously tried to avoid this by using memset_after(), but it seems
this does not fully address the problem. I noticed that the memset_after()
here is done on a different part of the union (status) than the original
cast was from (rate_driver_data), which may confuse the compiler.

Unfortunately, the memset_after() trick does not work on driver_rates[]
because that is part of an anonymous struct, and I could not get
struct_group() to do this either. Using two separate memset() calls
on the two members does address the warning though.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226852">SUSE bug 1226852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38618</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: timer: Set lower bound of start tick time

Currently ALSA timer doesn't have the lower limit of the start tick
time, and it allows a very small size, e.g. 1 tick with 1ns resolution
for hrtimer.  Such a situation may lead to an unexpected RCU stall,
where  the callback repeatedly queuing the expire update, as reported
by fuzzer.

This patch introduces a sanity check of the timer start tick time, so
that the system returns an error when a too small start size is set.
As of this patch, the lower limit is hard-coded to 100us, which is
small enough but can still work somehow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226754">SUSE bug 1226754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38619</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Check whether the media is initialized

The member "uzonesize" of struct alauda_info will remain 0
if alauda_init_media() fails, potentially causing divide errors
in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the
  first initialization.
- Add an error check for the return value of alauda_init_media().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226861">SUSE bug 1226861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38621</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: stk1160: fix bounds checking in stk1160_copy_video()

The subtract in this condition is reversed.  The -&gt;length is the length
of the buffer.  The -&gt;bytesused is how many bytes we have copied thus
far.  When the condition is reversed that means the result of the
subtraction is always negative but since it's unsigned then the result
is a very high positive value.  That means the overflow check is never
true.

Additionally, the -&gt;bytesused doesn't actually work for this purpose
because we're not writing to "buf-&gt;mem + buf-&gt;bytesused".  Instead, the
math to calculate the destination where we are writing is a bit
involved.  You calculate the number of full lines already written,
multiply by two, skip a line if necessary so that we start on an odd
numbered line, and add the offset into the line.

To fix this buffer overflow, just take the actual destination where we
are writing, if the offset is already out of bounds print an error and
return.  Otherwise, write up to buf-&gt;length bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226895">SUSE bug 1226895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38627</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

stm class: Fix a double free in stm_register_device()

The put_device(&amp;stm-&gt;dev) call will trigger stm_device_release() which
frees "stm" so the vfree(stm) on the next line is a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226857">SUSE bug 1226857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38628</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38628" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind.

Hang on to the control IDs instead of pointers since those are correctly
handled with locks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226911">SUSE bug 1226911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38630</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger

When the cpu5wdt module is removing, the origin code uses del_timer() to
de-activate the timer. If the timer handler is running, del_timer() could
not stop it and will return directly. If the port region is released by
release_region() and then the timer handler cpu5wdt_trigger() calls outb()
to write into the region that is released, the use-after-free bug will
happen.

Change del_timer() to timer_shutdown_sync() in order that the timer handler
could be finished before the port region is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226908">SUSE bug 1226908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38632</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38632" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: fix potential memory leak in vfio_intx_enable()

If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226860">SUSE bug 1226860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38633</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: max3100: Update uart_driver_registered on driver removal

The removal of the last MAX3100 device triggers the removal of
the driver. However, code doesn't update the respective global
variable and after insmod — rmmod — insmod cycle the kernel
oopses:

  max3100 spi-PRP0001:01: max3100_probe: adding port 0
  BUG: kernel NULL pointer dereference, address: 0000000000000408
  ...
  RIP: 0010:serial_core_register_port+0xa0/0x840
  ...
   max3100_probe+0x1b6/0x280 [max3100]
   spi_probe+0x8d/0xb0

Update the actual state so next time UART driver will be registered
again.

Hugo also noticed, that the error path in the probe also affected
by having the variable set, and not cleared. Instead of clearing it
move the assignment after the successfull uart_register_driver() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226867">SUSE bug 1226867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38634</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change()

uart_handle_cts_change() has to be called with port lock taken,
Since we run it in a separate work, the lock may not be taken at
the time of running. Make sure that it's taken by explicitly doing
that. Without it we got a splat:

  WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0
  ...
  Workqueue: max3100-0 max3100_work [max3100]
  RIP: 0010:uart_handle_cts_change+0xa6/0xb0
  ...
   max3100_handlerx+0xc5/0x110 [max3100]
   max3100_work+0x12a/0x340 [max3100]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226868">SUSE bug 1226868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38635</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: cadence: fix invalid PDI offset

For some reason, we add an offset to the PDI, presumably to skip the
PDI0 and PDI1 which are reserved for BPT.

This code is however completely wrong and leads to an out-of-bounds
access. We were just lucky so far since we used only a couple of PDIs
and remained within the PDI array bounds.

A Fixes: tag is not provided since there are no known platforms where
the out-of-bounds would be accessed, and the initial code had problems
as well.

A follow-up patch completely removes this useless offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226863">SUSE bug 1226863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38659</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

enic: Validate length of nl attributes in enic_set_vf_port

enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE
is of length PORT_PROFILE_MAX and that the nl attributes
IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.
These attributes are validated (in the function do_setlink in rtnetlink.c)
using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE
as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and
IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation
using the policy is for the max size of the attributes and not on exact
size so the length of these attributes might be less than the sizes that
enic_set_vf_port expects. This might cause an out of bands
read access in the memcpys of the data of these
attributes in enic_set_vf_port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226883">SUSE bug 1226883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/ap: Fix crash in AP internal function modify_bitmap()

A system crash like this

  Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403
  Fault in home space mode while using kernel ASCE.
  AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d
  Oops: 0038 ilc:3 [#1] PREEMPT SMP
  Modules linked in: mlx5_ib ...
  CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8
  Hardware name: IBM 3931 A01 704 (LPAR)
  Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
  Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3
  000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0
  000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff
  000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8
  Krnl Code: 0000014b75e7b5fc: a7840047            brc     8,0000014b75e7b68a
  0000014b75e7b600: 18b2                lr      %r11,%r2
  #0000014b75e7b602: a7f4000a            brc     15,0000014b75e7b616
  &gt;0000014b75e7b606: eb22d00000e6        laog    %r2,%r2,0(%r13)
  0000014b75e7b60c: a7680001            lhi     %r6,1
  0000014b75e7b610: 187b                lr      %r7,%r11
  0000014b75e7b612: 84960021            brxh    %r9,%r6,0000014b75e7b654
  0000014b75e7b616: 18e9                lr      %r14,%r9
  Call Trace:
  [&lt;0000014b75e7b606&gt;] ap_parse_bitmap_str+0x10e/0x1f8
  ([&lt;0000014b75e7b5dc&gt;] ap_parse_bitmap_str+0xe4/0x1f8)
  [&lt;0000014b75e7b758&gt;] apmask_store+0x68/0x140
  [&lt;0000014b75679196&gt;] kernfs_fop_write_iter+0x14e/0x1e8
  [&lt;0000014b75598524&gt;] vfs_write+0x1b4/0x448
  [&lt;0000014b7559894c&gt;] ksys_write+0x74/0x100
  [&lt;0000014b7618a440&gt;] __do_syscall+0x268/0x328
  [&lt;0000014b761a3558&gt;] system_call+0x70/0x98
  INFO: lockdep is turned off.
  Last Breaking-Event-Address:
  [&lt;0000014b75e7b636&gt;] ap_parse_bitmap_str+0x13e/0x1f8
  Kernel panic - not syncing: Fatal exception: panic_on_oops

occured when /sys/bus/ap/a[pq]mask was updated with a relative mask value
(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.

The fix is simple: use unsigned long values for the internal variables. The
correct checks are already in place in the function but a simple int for
the internal variables was used with the possibility to overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226996">SUSE bug 1226996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38662</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Allow delete from sockmap/sockhash only if update is allowed

We have seen an influx of syzkaller reports where a BPF program attached to
a tracepoint triggers a locking rule violation by performing a map_delete
on a sockmap/sockhash.

We don't intend to support this artificial use scenario. Extend the
existing verifier allowed-program-type check for updating sockmap/sockhash
to also cover deleting from a map.

From now on only BPF programs which were previously allowed to update
sockmap/sockhash can delete from these map types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226885">SUSE bug 1226885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38780</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf/sw-sync: don't enable IRQ from sync_print_obj()

Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from
known context") by error replaced spin_unlock_irqrestore() with
spin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite
sync_print_obj() is called from sync_debugfs_show(), lockdep complains
inconsistent lock state warning.

Use plain spin_{lock,unlock}() for sync_print_obj(), for
sync_debugfs_show() is already using spin_{lock,unlock}_irq().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226886">SUSE bug 1226886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39276</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()

Syzbot reports a warning as follows:

============================================
WARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290
Modules linked in:
CPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7
RIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419
Call Trace:
 &lt;TASK&gt;
 ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375
 generic_shutdown_super+0x136/0x2d0 fs/super.c:641
 kill_block_super+0x44/0x90 fs/super.c:1675
 ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327
[...]
============================================

This is because when finding an entry in ext4_xattr_block_cache_find(), if
ext4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown
in the __entry_find(), won't be put away, and eventually trigger the above
issue in mb_cache_destroy() due to reference count leakage.

So call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226993">SUSE bug 1226993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39301</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/9p: fix uninit-value in p9_client_rpc()

Syzbot with the help of KMSAN reported the following error:

BUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]
BUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 trace_9p_client_res include/trace/events/9p.h:146 [inline]
 p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
 __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598
 __alloc_pages_node include/linux/gfp.h:238 [inline]
 alloc_pages_node include/linux/gfp.h:261 [inline]
 alloc_slab_page mm/slub.c:2175 [inline]
 allocate_slab mm/slub.c:2338 [inline]
 new_slab+0x2de/0x1400 mm/slub.c:2391
 ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525
 __slab_alloc mm/slub.c:3610 [inline]
 __slab_alloc_node mm/slub.c:3663 [inline]
 slab_alloc_node mm/slub.c:3835 [inline]
 kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852
 p9_tag_alloc net/9p/client.c:278 [inline]
 p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641
 p9_client_rpc+0x27e/0x1340 net/9p/client.c:688
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

If p9_check_errors() fails early in p9_client_rpc(), req-&gt;rc.tag
will not be properly initialized. However, trace_9p_client_res()
ends up trying to print it out anyway before p9_client_rpc()
finishes.

Fix this issue by assigning default values to p9_fcall fields
such as 'tag' and (just in case KMSAN unearths something new) 'id'
during the tag allocation stage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226994">SUSE bug 1226994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39371</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39371" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check for non-NULL file pointer in io_file_can_poll()

In earlier kernels, it was possible to trigger a NULL pointer
dereference off the forced async preparation path, if no file had
been assigned. The trace leading to that looks as follows:

BUG: kernel NULL pointer dereference, address: 00000000000000b0
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 67 PID: 1633 Comm: buf-ring-invali Not tainted 6.8.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 2/2/2022
RIP: 0010:io_buffer_select+0xc3/0x210
Code: 00 00 48 39 d1 0f 82 ae 00 00 00 48 81 4b 48 00 00 01 00 48 89 73 70 0f b7 50 0c 66 89 53 42 85 ed 0f 85 d2 00 00 00 48 8b 13 &lt;48&gt; 8b 92 b0 00 00 00 48 83 7a 40 00 0f 84 21 01 00 00 4c 8b 20 5b
RSP: 0018:ffffb7bec38c7d88 EFLAGS: 00010246
RAX: ffff97af2be61000 RBX: ffff97af234f1700 RCX: 0000000000000040
RDX: 0000000000000000 RSI: ffff97aecfb04820 RDI: ffff97af234f1700
RBP: 0000000000000000 R08: 0000000000200030 R09: 0000000000000020
R10: ffffb7bec38c7dc8 R11: 000000000000c000 R12: ffffb7bec38c7db8
R13: ffff97aecfb05800 R14: ffff97aecfb05800 R15: ffff97af2be5e000
FS:  00007f852f74b740(0000) GS:ffff97b1eeec0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000b0 CR3: 000000016deab005 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 ? __die+0x1f/0x60
 ? page_fault_oops+0x14d/0x420
 ? do_user_addr_fault+0x61/0x6a0
 ? exc_page_fault+0x6c/0x150
 ? asm_exc_page_fault+0x22/0x30
 ? io_buffer_select+0xc3/0x210
 __io_import_iovec+0xb5/0x120
 io_readv_prep_async+0x36/0x70
 io_queue_sqe_fallback+0x20/0x260
 io_submit_sqes+0x314/0x630
 __do_sys_io_uring_enter+0x339/0xbc0
 ? __do_sys_io_uring_register+0x11b/0xc50
 ? vm_mmap_pgoff+0xce/0x160
 do_syscall_64+0x5f/0x180
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0x55e0a110a67e
Code: ba cc 00 00 00 45 31 c0 44 0f b6 92 d0 00 00 00 31 d2 41 b9 08 00 00 00 41 83 e2 01 41 c1 e2 04 41 09 c2 b8 aa 01 00 00 0f 05 &lt;c3&gt; 90 89 30 eb a9 0f 1f 40 00 48 8b 42 20 8b 00 a8 06 75 af 85 f6

because the request is marked forced ASYNC and has a bad file fd, and
hence takes the forced async prep path.

Current kernels with the request async prep cleaned up can no longer hit
this issue, but for ease of backporting, let's add this safety check in
here too as it really doesn't hurt. For both cases, this will inevitably
end with a CQE posted with -EBADF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226990">SUSE bug 1226990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39463</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

9p: add missing locking around taking dentry fid list

Fix a use-after-free on dentry's d_fsdata fid list when a thread
looks up a fid through dentry while another thread unlinks it:

UAF thread:
refcount_t: addition on 0; use-after-free.
 p9_fid_get linux/./include/net/9p/client.h:262
 v9fs_fid_find+0x236/0x280 linux/fs/9p/fid.c:129
 v9fs_fid_lookup_with_uid linux/fs/9p/fid.c:181
 v9fs_fid_lookup+0xbf/0xc20 linux/fs/9p/fid.c:314
 v9fs_vfs_getattr_dotl+0xf9/0x360 linux/fs/9p/vfs_inode_dotl.c:400
 vfs_statx+0xdd/0x4d0 linux/fs/stat.c:248

Freed by:
 p9_fid_destroy (inlined)
 p9_client_clunk+0xb0/0xe0 linux/net/9p/client.c:1456
 p9_fid_put linux/./include/net/9p/client.h:278
 v9fs_dentry_release+0xb5/0x140 linux/fs/9p/vfs_dentry.c:55
 v9fs_remove+0x38f/0x620 linux/fs/9p/vfs_inode.c:518
 vfs_unlink+0x29a/0x810 linux/fs/namei.c:4335

The problem is that d_fsdata was not accessed under d_lock, because
d_release() normally is only called once the dentry is otherwise no
longer accessible but since we also call it explicitly in v9fs_remove
that lock is required:
move the hlist out of the dentry under lock then unref its fids once
they are no longer accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227091">SUSE bug 1227091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39468</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix deadlock in smb2_find_smb_tcon()

Unlock cifs_tcp_ses_lock before calling cifs_put_smb_ses() to avoid such
deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227103">SUSE bug 1227103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39469</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors

The error handling in nilfs_empty_dir() when a directory folio/page read
fails is incorrect, as in the old ext2 implementation, and if the
folio/page cannot be read or nilfs_check_folio() fails, it will falsely
determine the directory as empty and corrupt the file system.

In addition, since nilfs_empty_dir() does not immediately return on a
failed folio/page read, but continues to loop, this can cause a long loop
with I/O if i_size of the directory's inode is also corrupted, causing the
log writer thread to wait and hang, as reported by syzbot.

Fix these issues by making nilfs_empty_dir() immediately return a false
value (0) if it fails to get a directory folio/page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226992">SUSE bug 1226992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39471</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add error handle to avoid out-of-bounds

if the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should
be stop to avoid out-of-bounds read, so directly return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227096">SUSE bug 1227096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39472</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix log recovery buffer allocation for the legacy h_size fixup

Commit a70f9fe52daa ("xfs: detect and handle invalid iclog size set by
mkfs") added a fixup for incorrect h_size values used for the initial
umount record in old xfsprogs versions.  Later commit 0c771b99d6c9
("xfs: clean up calculation of LR header blocks") cleaned up the log
reover buffer calculation, but stoped using the fixed up h_size value
to size the log recovery buffer, which can lead to an out of bounds
access when the incorrect h_size does not come from the old mkfs
tool, but a fuzzer.

Fix this by open coding xlog_logrec_hblks and taking the fixed h_size
into account for this calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227432">SUSE bug 1227432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39475</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: savage: Handle err return when savagefb_check_var failed

The commit 04e5eac8f3ab("fbdev: savage: Error out if pixclock equals zero")
checks the value of pixclock to avoid divide-by-zero error. However
the function savagefb_probe doesn't handle the error return of
savagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227435">SUSE bug 1227435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39476</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING

Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with
small possibility, the root cause is exactly the same as commit
bed9e27baf52 ("Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"")

However, Dan reported another hang after that, and junxiao investigated
the problem and found out that this is caused by plugged bio can't issue
from raid5d().

Current implementation in raid5d() has a weird dependence:

1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear
   MD_SB_CHANGE_PENDING;
2) raid5d() handles IO in a deadloop, until all IO are issued;
3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;

This behaviour is introduce before v2.6, and for consequence, if other
context hold 'reconfig_mutex', and md_check_recovery() can't update
super_block, then raid5d() will waste one cpu 100% by the deadloop, until
'reconfig_mutex' is released.

Refer to the implementation from raid1 and raid10, fix this problem by
skipping issue IO if MD_SB_CHANGE_PENDING is still set after
md_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'
is released. Meanwhile, the hang problem will be fixed as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227437">SUSE bug 1227437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39482</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: fix variable length array abuse in btree_iter

btree_iter is used in two ways: either allocated on the stack with a
fixed size MAX_BSETS, or from a mempool with a dynamic size based on the
specific cache set. Previously, the struct had a fixed-length array of
size MAX_BSETS which was indexed out-of-bounds for the dynamically-sized
iterators, which causes UBSAN to complain.

This patch uses the same approach as in bcachefs's sort_iter and splits
the iterator into a btree_iter with a flexible array member and a
btree_iter_stack which embeds a btree_iter as well as a fixed-length
data array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227447">SUSE bug 1227447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39487</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()

In function bond_option_arp_ip_targets_set(), if newval-&gt;string is an
empty string, newval-&gt;string+1 will point to the byte after the
string, causing an out-of-bound read.

BUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418
Read of size 1 at addr ffff8881119c4781 by task syz-executor665/8107
CPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0xc1/0x5e0 mm/kasan/report.c:475
 kasan_report+0xbe/0xf0 mm/kasan/report.c:588
 strlen+0x7d/0xa0 lib/string.c:418
 __fortify_strlen include/linux/fortify-string.h:210 [inline]
 in4_pton+0xa3/0x3f0 net/core/utils.c:130
 bond_option_arp_ip_targets_set+0xc2/0x910
drivers/net/bonding/bond_options.c:1201
 __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767
 __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792
 bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817
 bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156
 dev_attr_store+0x54/0x80 drivers/base/core.c:2366
 sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136
 kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x96a/0xd80 fs/read_write.c:584
 ksys_write+0x122/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
---[ end trace ]---

Fix it by adding a check of string length before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227573">SUSE bug 1227573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39488</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY

When CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes
to bug_table entries, and as a result the last entry in a bug table will
be ignored, potentially leading to an unexpected panic(). All prior
entries in the table will be handled correctly.

The arm64 ABI requires that struct fields of up to 8 bytes are
naturally-aligned, with padding added within a struct such that struct
are suitably aligned within arrays.

When CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:

	struct bug_entry {
		signed int      bug_addr_disp;	// 4 bytes
		signed int      file_disp;	// 4 bytes
		unsigned short  line;		// 2 bytes
		unsigned short  flags;		// 2 bytes
	}

... with 12 bytes total, requiring 4-byte alignment.

When CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:

	struct bug_entry {
		signed int      bug_addr_disp;	// 4 bytes
		unsigned short  flags;		// 2 bytes
		&lt; implicit padding &gt;		// 2 bytes
	}

... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing
padding, requiring 4-byte alginment.

When we create a bug_entry in assembly, we align the start of the entry
to 4 bytes, which implicitly handles padding for any prior entries.
However, we do not align the end of the entry, and so when
CONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding
bytes.

For the main kernel image this is not a problem as find_bug() doesn't
depend on the trailing padding bytes when searching for entries:

	for (bug = __start___bug_table; bug &lt; __stop___bug_table; ++bug)
		if (bugaddr == bug_addr(bug))
			return bug;

However for modules, module_bug_finalize() depends on the trailing
bytes when calculating the number of entries:

	mod-&gt;num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);

... and as the last bug_entry lacks the necessary padding bytes, this entry
will not be counted, e.g. in the case of a single entry:

	sechdrs[i].sh_size == 6
	sizeof(struct bug_entry) == 8;

	sechdrs[i].sh_size / sizeof(struct bug_entry) == 0;

Consequently module_find_bug() will miss the last bug_entry when it does:

	for (i = 0; i &lt; mod-&gt;num_bugs; ++i, ++bug)
		if (bugaddr == bug_addr(bug))
			goto out;

... which can lead to a kenrel panic due to an unhandled bug.

This can be demonstrated with the following module:

	static int __init buginit(void)
	{
		WARN(1, "hello\n");
		return 0;
	}

	static void __exit bugexit(void)
	{
	}

	module_init(buginit);
	module_exit(bugexit);
	MODULE_LICENSE("GPL");

... which will trigger a kernel panic when loaded:

	------------[ cut here ]------------
	hello
	Unexpected kernel BRK exception at EL1
	Internal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP
	Modules linked in: hello(O+)
	CPU: 0 PID: 50 Comm: insmod Tainted: G           O       6.9.1 #8
	Hardware name: linux,dummy-virt (DT)
	pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
	pc : buginit+0x18/0x1000 [hello]
	lr : buginit+0x18/0x1000 [hello]
	sp : ffff800080533ae0
	x29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000
	x26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58
	x23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0
	x20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006
	x17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720
	x14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312
	x11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8
	x8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000
	x5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000
	x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0
	Call trace:
	 buginit+0x18/0x1000 [hello]
	 do_one_initcall+0x80/0x1c8
	 do_init_module+0x60/0x218
	 load_module+0x1ba4/0x1d70
	 __do_sys_init_module+0x198/0x1d0
	 __arm64_sys_init_module+0x1c/0x28
	 invoke_syscall+0x48/0x114
	 el0_svc
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227618">SUSE bug 1227618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39489</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix memleak in seg6_hmac_init_algo

seg6_hmac_init_algo returns without cleaning up the previous allocations
if one fails, so it's going to leak all that memory and the crypto tfms.

Update seg6_hmac_exit to only free the memory when allocated, so we can
reuse the code directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227623">SUSE bug 1227623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39490</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix missing sk_buff release in seg6_input_core

The seg6_input() function is responsible for adding the SRH into a
packet, delegating the operation to the seg6_input_core(). This function
uses the skb_cow_head() to ensure that there is sufficient headroom in
the sk_buff for accommodating the link-layer header.
In the event that the skb_cow_header() function fails, the
seg6_input_core() catches the error but it does not release the sk_buff,
which will result in a memory leak.

This issue was introduced in commit af3b5158b89d ("ipv6: sr: fix BUG due
to headroom too small after SRH push") and persists even after commit
7a3f5b0de364 ("netfilter: add netfilter hooks to SRv6 data plane"),
where the entire seg6_input() code was refactored to deal with netfilter
hooks.

The proposed patch addresses the identified memory leak by requiring the
seg6_input_core() function to release the sk_buff in the event that
skb_cow_head() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227626">SUSE bug 1227626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39493</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak

Using completion_done to determine whether the caller has gone
away only works after a complete call.  Furthermore it's still
possible that the caller has not yet called wait_for_completion,
resulting in another potential UAF.

Fix this by making the caller use cancel_work_sync and then freeing
the memory safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227620">SUSE bug 1227620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39494</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Fix use-after-free on a dentry's dname.name

-&gt;d_name.name can change on rename and the earlier value can be freed;
there are conditions sufficient to stabilize it (-&gt;d_lock on dentry,
-&gt;d_lock on its parent, -&gt;i_rwsem exclusive on the parent's inode,
rename_lock), but none of those are met at any of the sites. Take a stable
snapshot of the name instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227901">SUSE bug 1227901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39497</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)

Lack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap
allows users to call mmap with PROT_WRITE and MAP_PRIVATE flag
causing a kernel panic due to BUG_ON in vmf_insert_pfn_prot:
BUG_ON((vma-&gt;vm_flags &amp; VM_PFNMAP) &amp;&amp; is_cow_mapping(vma-&gt;vm_flags));

Return -EINVAL early if COW mapping is detected.

This bug affects all drm drivers using default shmem helpers.
It can be reproduced by this simple example:
void *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset);
ptr[0] = 0;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227722">SUSE bug 1227722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39499</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmci: prevent speculation leaks by sanitizing event in event_deliver()

Coverity spotted that event_msg is controlled by user-space,
event_msg-&gt;event_data.event is passed to event_deliver() and used
as an index without sanitization.

This change ensures that the event index is sanitized to mitigate any
possibility of speculative information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.

Only compile tested, no access to HW.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227725">SUSE bug 1227725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39500</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: avoid race between sock_map_close and sk_psock_put

sk_psock_get will return NULL if the refcount of psock has gone to 0, which
will happen when the last call of sk_psock_put is done. However,
sk_psock_drop may not have finished yet, so the close callback will still
point to sock_map_close despite psock being NULL.

This can be reproduced with a thread deleting an element from the sock map,
while the second one creates a socket, adds it to the map and closes it.

That will trigger the WARN_ON_ONCE:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 7220 at net/core/sock_map.c:1701 sock_map_close+0x2a2/0x2d0 net/core/sock_map.c:1701
Modules linked in:
CPU: 1 PID: 7220 Comm: syz-executor380 Not tainted 6.9.0-syzkaller-07726-g3c999d1ae3c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:sock_map_close+0x2a2/0x2d0 net/core/sock_map.c:1701
Code: df e8 92 29 88 f8 48 8b 1b 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 79 29 88 f8 4c 8b 23 eb 89 e8 4f 15 23 f8 90 &lt;0f&gt; 0b 90 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d e9 13 26 3d 02
RSP: 0018:ffffc9000441fda8 EFLAGS: 00010293
RAX: ffffffff89731ae1 RBX: ffffffff94b87540 RCX: ffff888029470000
RDX: 0000000000000000 RSI: ffffffff8bcab5c0 RDI: ffffffff8c1faba0
RBP: 0000000000000000 R08: ffffffff92f9b61f R09: 1ffffffff25f36c3
R10: dffffc0000000000 R11: fffffbfff25f36c4 R12: ffffffff89731840
R13: ffff88804b587000 R14: ffff88804b587000 R15: ffffffff89731870
FS:  000055555e080380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000207d4000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 unix_release+0x87/0xc0 net/unix/af_unix.c:1048
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbe/0x240 net/socket.c:1421
 __fput+0x42b/0x8a0 fs/file_table.c:422
 __do_sys_close fs/open.c:1556 [inline]
 __se_sys_close fs/open.c:1541 [inline]
 __x64_sys_close+0x7f/0x110 fs/open.c:1541
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb37d618070
Code: 00 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d4 e8 10 2c 00 00 80 3d 31 f0 07 00 00 74 17 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c
RSP: 002b:00007ffcd4a525d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fb37d618070
RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000100000000 R09: 0000000100000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Use sk_psock, which will only check that the pointer is not been set to
NULL yet, which should only happen after the callbacks are restored. If,
then, a reference can still be gotten, we may call sk_psock_stop and cancel
psock-&gt;work.

As suggested by Paolo Abeni, reorder the condition so the control flow is
less convoluted.

After that change, the reproducer does not trigger the WARN_ON_ONCE
anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227724">SUSE bug 1227724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39501</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: core: synchronize really_probe() and dev_uevent()

Synchronize the dev-&gt;driver usage in really_probe() and dev_uevent().
These can run in different threads, what can result in the following
race condition for dev-&gt;driver uninitialization:

Thread #1:
==========

really_probe() {
...
probe_failed:
...
device_unbind_cleanup(dev) {
    ...
    dev-&gt;driver = NULL;   // &lt;= Failed probe sets dev-&gt;driver to NULL
    ...
    }
...
}

Thread #2:
==========

dev_uevent() {
...
if (dev-&gt;driver)
      // If dev-&gt;driver is NULLed from really_probe() from here on,
      // after above check, the system crashes
      add_uevent_var(env, "DRIVER=%s", dev-&gt;driver-&gt;name);
...
}

really_probe() holds the lock, already. So nothing needs to be done
there. dev_uevent() is called with lock held, often, too. But not
always. What implies that we can't add any locking in dev_uevent()
itself. So fix this race by adding the lock to the non-protected
path. This is the path where above race is observed:

 dev_uevent+0x235/0x380
 uevent_show+0x10c/0x1f0  &lt;= Add lock here
 dev_attr_show+0x3a/0xa0
 sysfs_kf_seq_show+0x17c/0x250
 kernfs_seq_show+0x7c/0x90
 seq_read_iter+0x2d7/0x940
 kernfs_fop_read_iter+0xc6/0x310
 vfs_read+0x5bc/0x6b0
 ksys_read+0xeb/0x1b0
 __x64_sys_read+0x42/0x50
 x64_sys_call+0x27ad/0x2d30
 do_syscall_64+0xcd/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Similar cases are reported by syzkaller in

https://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a

But these are regarding the *initialization* of dev-&gt;driver

dev-&gt;driver = drv;

As this switches dev-&gt;driver to non-NULL these reports can be considered
to be false-positives (which should be "fixed" by this commit, as well,
though).

The same issue was reported and tried to be fixed back in 2015 in

https://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/

already.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227754">SUSE bug 1227754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39502</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: fix use after netif_napi_del()

When queues are started, netif_napi_add() and napi_enable() are called.
If there are 4 queues and only 3 queues are used for the current
configuration, only 3 queues' napi should be registered and enabled.
The ionic_qcq_enable() checks whether the .poll pointer is not NULL for
enabling only the using queue' napi. Unused queues' napi will not be
registered by netif_napi_add(), so the .poll pointer indicates NULL.
But it couldn't distinguish whether the napi was unregistered or not
because netif_napi_del() doesn't reset the .poll pointer to NULL.
So, ionic_qcq_enable() calls napi_enable() for the queue, which was
unregistered by netif_napi_del().

Reproducer:
   ethtool -L &lt;interface name&gt; rx 1 tx 1 combined 0
   ethtool -L &lt;interface name&gt; rx 0 tx 0 combined 1
   ethtool -L &lt;interface name&gt; rx 0 tx 0 combined 4

Splat looks like:
kernel BUG at net/core/dev.c:6666!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 1057 Comm: kworker/3:3 Not tainted 6.10.0-rc2+ #16
Workqueue: events ionic_lif_deferred_work [ionic]
RIP: 0010:napi_enable+0x3b/0x40
Code: 48 89 c2 48 83 e2 f6 80 b9 61 09 00 00 00 74 0d 48 83 bf 60 01 00 00 00 74 03 80 ce 01 f0 4f
RSP: 0018:ffffb6ed83227d48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff97560cda0828 RCX: 0000000000000029
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff97560cda0a28
RBP: ffffb6ed83227d50 R08: 0000000000000400 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
R13: ffff97560ce3c1a0 R14: 0000000000000000 R15: ffff975613ba0a20
FS:  0000000000000000(0000) GS:ffff975d5f780000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8f734ee200 CR3: 0000000103e50000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? die+0x33/0x90
 ? do_trap+0xd9/0x100
 ? napi_enable+0x3b/0x40
 ? do_error_trap+0x83/0xb0
 ? napi_enable+0x3b/0x40
 ? napi_enable+0x3b/0x40
 ? exc_invalid_op+0x4e/0x70
 ? napi_enable+0x3b/0x40
 ? asm_exc_invalid_op+0x16/0x20
 ? napi_enable+0x3b/0x40
 ionic_qcq_enable+0xb7/0x180 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_start_queues+0xc4/0x290 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_link_status_check+0x11c/0x170 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_lif_deferred_work+0x129/0x280 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 process_one_work+0x145/0x360
 worker_thread+0x2bb/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xcc/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2d/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227755">SUSE bug 1227755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39505</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/komeda: check for error-valued pointer

komeda_pipeline_get_state() may return an error-valued pointer, thus
check the pointer for negative or null value before dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227728">SUSE bug 1227728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39506</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet

In lio_vf_rep_copy_packet() pg_info-&gt;page is compared to a NULL value,
but then it is unconditionally passed to skb_add_rx_frag() which looks
strange and could lead to null pointer dereference.

lio_vf_rep_copy_packet() call trace looks like:
	octeon_droq_process_packets
	 octeon_droq_fast_process_packets
	  octeon_droq_dispatch_pkt
	   octeon_create_recv_info
	    ...search in the dispatch_list...
	     -&gt;disp_fn(rdisp-&gt;rinfo, ...)
	      lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)
In this path there is no code which sets pg_info-&gt;page to NULL.
So this check looks unneeded and doesn't solve potential problem.
But I guess the author had reason to add a check and I have no such card
and can't do real test.
In addition, the code in the function liquidio_push_packet() in
liquidio/lio_core.c does exactly the same.

Based on this, I consider the most acceptable compromise solution to
adjust this issue by moving skb_add_rx_frag() into conditional scope.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227729">SUSE bug 1227729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39507</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash problem in concurrent scenario

When link status change, the nic driver need to notify the roce
driver to handle this event, but at this time, the roce driver
may uninit, then cause kernel crash.

To fix the problem, when link status change, need to check
whether the roce registered, and when uninit, need to wait link
update finish.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227730">SUSE bug 1227730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39508</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/io-wq: Use set_bit() and test_bit() at worker-&gt;flags

Utilize set_bit() and test_bit() on worker-&gt;flags within io_uring/io-wq
to address potential data races.

The structure io_worker-&gt;flags may be accessed through various data
paths, leading to concurrency issues. When KCSAN is enabled, it reveals
data races occurring in io_worker_handle_work and
io_wq_activate_free_worker functions.

	 BUG: KCSAN: data-race in io_worker_handle_work / io_wq_activate_free_worker
	 write to 0xffff8885c4246404 of 4 bytes by task 49071 on cpu 28:
	 io_worker_handle_work (io_uring/io-wq.c:434 io_uring/io-wq.c:569)
	 io_wq_worker (io_uring/io-wq.c:?)
&lt;snip&gt;

	 read to 0xffff8885c4246404 of 4 bytes by task 49024 on cpu 5:
	 io_wq_activate_free_worker (io_uring/io-wq.c:? io_uring/io-wq.c:285)
	 io_wq_enqueue (io_uring/io-wq.c:947)
	 io_queue_iowq (io_uring/io_uring.c:524)
	 io_req_task_submit (io_uring/io_uring.c:1511)
	 io_handle_tw_list (io_uring/io_uring.c:1198)
&lt;snip&gt;

Line numbers against commit 18daea77cca6 ("Merge tag 'for-linus' of
git://git.kernel.org/pub/scm/virt/kvm/kvm").

These races involve writes and reads to the same memory location by
different tasks running on different CPUs. To mitigate this, refactor
the code to use atomic operations such as set_bit(), test_bit(), and
clear_bit() instead of basic "and" and "or" operations. This ensures
thread-safe manipulation of worker flags.

Also, move `create_index` to avoid holes in the structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227732">SUSE bug 1227732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39509</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: remove unnecessary WARN_ON() in implement()

Syzkaller hit a warning [1] in a call to implement() when trying
to write a value into a field of smaller size in an output report.

Since implement() already has a warn message printed out with the
help of hid_warn() and value in question gets trimmed with:
	...
	value &amp;= m;
	...
WARN_ON may be considered superfluous. Remove it to suppress future
syzkaller triggers.

[1]
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline]
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863
Modules linked in:
CPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:implement drivers/hid/hid-core.c:1451 [inline]
RIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863
...
Call Trace:
 &lt;TASK&gt;
 __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline]
 usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636
 hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:904 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227733">SUSE bug 1227733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4032</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000077.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2959-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    The "ipaddress" module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as "globally reachable" or "private". This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.

CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873840" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873841" comment="python3-3.6.15-150300.10.65.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009873842" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036185.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228184">SUSE bug 1228184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877663" comment="liborc-0_4-0-0.4.28-150000.3.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877348" comment="liborc-0_4-0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: remove requests from xarray during flushing requests

Even with CACHEFILES_DEAD set, we can still read the requests, so in the
following concurrency the request may be used after it has been freed:

     mount  |   daemon_thread1    |    daemon_thread2
------------------------------------------------------------
 cachefiles_ondemand_init_object
  cachefiles_ondemand_send_req
   REQ_A = kzalloc(sizeof(*req) + data_len)
   wait_for_completion(&amp;REQ_A-&gt;done)
            cachefiles_daemon_read
             cachefiles_ondemand_daemon_read
                                  // close dev fd
                                  cachefiles_flush_reqs
                                   complete(&amp;REQ_A-&gt;done)
   kfree(REQ_A)
              xa_lock(&amp;cache-&gt;reqs);
              cachefiles_ondemand_select_req
                req-&gt;msg.opcode != CACHEFILES_OP_READ
                // req use-after-free !!!
              xa_unlock(&amp;cache-&gt;reqs);
                                   xa_destroy(&amp;cache-&gt;reqs)

Hence remove requests from cache-&gt;reqs when flushing them to avoid
accessing freed requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227760">SUSE bug 1227760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory

There is a potential out-of-bounds access when using test_bit() on a single
word. The test_bit() and set_bit() functions operate on long values, and
when testing or setting a single word, they can exceed the word
boundary. KASAN detects this issue and produces a dump:

	 BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas

	 Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965

For full log, please look at [1].

Make the allocation at least the size of sizeof(unsigned long) so that
set_bit() and test_bit() have sufficient room for read/write operations
without overwriting unallocated memory.

[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227762">SUSE bug 1227762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40902</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: xattr: fix buffer overflow for invalid xattr

When an xattr size is not what is expected, it is printed out to the
kernel log in hex format as a form of debugging.  But when that xattr
size is bigger than the expected size, printing it out can cause an
access off the end of the buffer.

Fix this all up by properly restricting the size of the debug hex dump
in the kernel log.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps

There could be a potential use-after-free case in
tcpm_register_source_caps(). This could happen when:
 * new (say invalid) source caps are advertised
 * the existing source caps are unregistered
 * tcpm_register_source_caps() returns with an error as
   usb_power_delivery_register_capabilities() fails

This causes port-&gt;partner_source_caps to hold on to the now freed source
caps.

Reset port-&gt;partner_source_caps value to NULL after unregistering
existing source caps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227766">SUSE bug 1227766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages

The syzbot fuzzer found that the interrupt-URB completion callback in
the cdc-wdm driver was taking too long, and the driver's immediate
resubmission of interrupt URBs with -EPROTO status combined with the
dummy-hcd emulation to cause a CPU lockup:

cdc_wdm 1-1:1.0: nonzero urb status received: -71
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
CPU#0 Utilization every 4s during lockup:
	#1:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#2:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#3:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#4:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#5:  98% system,	  1% softirq,	  3% hardirq,	  0% idle
Modules linked in:
irq event stamp: 73096
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_emit_next_record kernel/printk/printk.c:2935 [inline]
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
softirqs last disabled at (73043): [&lt;ffff800080020de8&gt;] __do_softirq+0x14/0x20 kernel/softirq.c:588
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G        W          6.10.0-rc2-syzkaller-g8867bbd4a056 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024

Testing showed that the problem did not occur if the two error
messages -- the first two lines above -- were removed; apparently adding
material to the kernel log takes a surprisingly large amount of time.

In any case, the best approach for preventing these lockups and to
avoid spamming the log with thousands of error messages per second is
to ratelimit the two dev_err() calls.  Therefore we replace them with
dev_err_ratelimited().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227772">SUSE bug 1227772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible race in __fib6_drop_pcpu_from()

syzbot found a race in __fib6_drop_pcpu_from() [1]

If compiler reads more than once (*ppcpu_rt),
second read could read NULL, if another cpu clears
the value in rt6_get_pcpu_route().

Add a READ_ONCE() to prevent this race.

Also add rcu_read_lock()/rcu_read_unlock() because
we rely on RCU protection while dereferencing pcpu_rt.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000012: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
CPU: 0 PID: 7543 Comm: kworker/u8:17 Not tainted 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: netns cleanup_net
 RIP: 0010:__fib6_drop_pcpu_from.part.0+0x10a/0x370 net/ipv6/ip6_fib.c:984
Code: f8 48 c1 e8 03 80 3c 28 00 0f 85 16 02 00 00 4d 8b 3f 4d 85 ff 74 31 e8 74 a7 fa f7 49 8d bf 90 00 00 00 48 89 f8 48 c1 e8 03 &lt;80&gt; 3c 28 00 0f 85 1e 02 00 00 49 8b 87 90 00 00 00 48 8b 0c 24 48
RSP: 0018:ffffc900040df070 EFLAGS: 00010206
RAX: 0000000000000012 RBX: 0000000000000001 RCX: ffffffff89932e16
RDX: ffff888049dd1e00 RSI: ffffffff89932d7c RDI: 0000000000000091
RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000007
R10: 0000000000000001 R11: 0000000000000006 R12: ffff88807fa080b8
R13: fffffbfff1a9a07d R14: ffffed100ff41022 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32c26000 CR3: 000000005d56e000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  __fib6_drop_pcpu_from net/ipv6/ip6_fib.c:966 [inline]
  fib6_drop_pcpu_from net/ipv6/ip6_fib.c:1027 [inline]
  fib6_purge_rt+0x7f2/0x9f0 net/ipv6/ip6_fib.c:1038
  fib6_del_route net/ipv6/ip6_fib.c:1998 [inline]
  fib6_del+0xa70/0x17b0 net/ipv6/ip6_fib.c:2043
  fib6_clean_node+0x426/0x5b0 net/ipv6/ip6_fib.c:2205
  fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2127
  fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2175
  fib6_clean_tree+0xd7/0x120 net/ipv6/ip6_fib.c:2255
  __fib6_clean_all+0x100/0x2d0 net/ipv6/ip6_fib.c:2271
  rt6_sync_down_dev net/ipv6/route.c:4906 [inline]
  rt6_disable_ip+0x7ed/0xa00 net/ipv6/route.c:4911
  addrconf_ifdown.isra.0+0x117/0x1b40 net/ipv6/addrconf.c:3855
  addrconf_notify+0x223/0x19e0 net/ipv6/addrconf.c:3778
  notifier_call_chain+0xb9/0x410 kernel/notifier.c:93
  call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:1992
  call_netdevice_notifiers_extack net/core/dev.c:2030 [inline]
  call_netdevice_notifiers net/core/dev.c:2044 [inline]
  dev_close_many+0x333/0x6a0 net/core/dev.c:1585
  unregister_netdevice_many_notify+0x46d/0x19f0 net/core/dev.c:11193
  unregister_netdevice_many net/core/dev.c:11276 [inline]
  default_device_exit_batch+0x85b/0xae0 net/core/dev.c:11759
  ops_exit_list+0x128/0x180 net/core/net_namespace.c:178
  cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227761">SUSE bug 1227761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40906</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Always stop health timer during driver removal

Currently, if teardown_hca fails to execute during driver removal, mlx5
does not stop the health timer. Afterwards, mlx5 continue with driver
teardown. This may lead to a UAF bug, which results in page fault
Oops[1], since the health timer invokes after resources were freed.

Hence, stop the health monitor even if teardown_hca fails.

[1]
mlx5_core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)
mlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)
mlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)
mlx5_core 0000:18:00.0: E-Switch: cleanup
mlx5_core 0000:18:00.0: wait_func:1155:(pid 1967079): TEARDOWN_HCA(0x103) timeout. Will cause a leak of a command resource
mlx5_core 0000:18:00.0: mlx5_function_close:1288:(pid 1967079): tear_down_hca failed, skip cleanup
BUG: unable to handle page fault for address: ffffa26487064230
PGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           OE     -------  ---  6.7.0-68.fc38.x86_64 #1
Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020
RIP: 0010:ioread32be+0x34/0x60
RSP: 0018:ffffa26480003e58 EFLAGS: 00010292
RAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0
RDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230
RBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8
R10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0
R13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0
FS:  0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x171/0x4e0
 ? exc_page_fault+0x175/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 ? ioread32be+0x34/0x60
 mlx5_health_check_fatal_sensors+0x20/0x100 [mlx5_core]
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 poll_health+0x42/0x230 [mlx5_core]
 ? __next_timer_interrupt+0xbc/0x110
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 call_timer_fn+0x21/0x130
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 __run_timers+0x222/0x2c0
 run_timer_softirq+0x1d/0x40
 __do_softirq+0xc9/0x2c8
 __irq_exit_rcu+0xa6/0xc0
 sysvec_apic_timer_interrupt+0x72/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:cpuidle_enter_state+0xcc/0x440
 ? cpuidle_enter_state+0xbd/0x440
 cpuidle_enter+0x2d/0x40
 do_idle+0x20d/0x270
 cpu_startup_entry+0x2a/0x30
 rest_init+0xd0/0xd0
 arch_call_rest_init+0xe/0x30
 start_kernel+0x709/0xa90
 x86_64_start_reservations+0x18/0x30
 x86_64_start_kernel+0x96/0xa0
 secondary_startup_64_no_verify+0x18f/0x19b
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227763">SUSE bug 1227763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Set run context for rawtp test_run callback

syzbot reported crash when rawtp program executed through the
test_run interface calls bpf_get_attach_cookie helper or any
other helper that touches task-&gt;bpf_ctx pointer.

Setting the run context (task-&gt;bpf_ctx pointer) for test_run
callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227783">SUSE bug 1227783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40909</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a potential use-after-free in bpf_link_free()

After commit 1a80dbcb2dba, bpf_link can be freed by
link-&gt;ops-&gt;dealloc_deferred, but the code still tests and uses
link-&gt;ops-&gt;dealloc afterward, which leads to a use-after-free as
reported by syzbot. Actually, one of them should be sufficient, so
just call one of them instead of both. Also add a WARN_ON() in case
of any problematic implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227798">SUSE bug 1227798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228349">SUSE bug 1228349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40910</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix refcount imbalance on inbound connections

When releasing a socket in ax25_release(), we call netdev_put() to
decrease the refcount on the associated ax.25 device. However, the
execution path for accepting an incoming connection never calls
netdev_hold(). This imbalance leads to refcount errors, and ultimately
to kernel crashes.

A typical call trace for the above situation will start with one of the
following errors:

    refcount_t: decrement hit 0; leaking memory.
    refcount_t: underflow; use-after-free.

And will then have a trace like:

    Call Trace:
    &lt;TASK&gt;
    ? show_regs+0x64/0x70
    ? __warn+0x83/0x120
    ? refcount_warn_saturate+0xb2/0x100
    ? report_bug+0x158/0x190
    ? prb_read_valid+0x20/0x30
    ? handle_bug+0x3e/0x70
    ? exc_invalid_op+0x1c/0x70
    ? asm_exc_invalid_op+0x1f/0x30
    ? refcount_warn_saturate+0xb2/0x100
    ? refcount_warn_saturate+0xb2/0x100
    ax25_release+0x2ad/0x360
    __sock_release+0x35/0xa0
    sock_close+0x19/0x20
    [...]

On reboot (or any attempt to remove the interface), the kernel gets
stuck in an infinite loop:

    unregister_netdevice: waiting for ax0 to become free. Usage count = 0

This patch corrects these issues by ensuring that we call netdev_hold()
and ax25_dev_hold() for new connections in ax25_accept(). This makes the
logic leading to ax25_accept() match the logic for ax25_bind(): in both
cases we increment the refcount, which is ultimately decremented in
ax25_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227902">SUSE bug 1227902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40911</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Lock wiphy in cfg80211_get_station

Wiphy should be locked before calling rdev_get_station() (see lockdep
assert in ieee80211_get_station()).

This fixes the following kernel NULL dereference:

 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
 Mem abort info:
   ESR = 0x0000000096000006
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x06: level 2 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000006
   CM = 0, WnR = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000
 [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000
 Internal error: Oops: 0000000096000006 [#1] SMP
 Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath
 CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705
 Hardware name: RPT (r1) (DT)
 Workqueue: bat_events batadv_v_elp_throughput_metric_update
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]
 lr : sta_set_sinfo+0xcc/0xbd4
 sp : ffff000007b43ad0
 x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98
 x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000
 x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc
 x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000
 x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d
 x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e
 x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000
 x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000
 x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90
 x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000
 Call trace:
  ath10k_sta_statistics+0x10/0x2dc [ath10k_core]
  sta_set_sinfo+0xcc/0xbd4
  ieee80211_get_station+0x2c/0x44
  cfg80211_get_station+0x80/0x154
  batadv_v_elp_get_throughput+0x138/0x1fc
  batadv_v_elp_throughput_metric_update+0x1c/0xa4
  process_one_work+0x1ec/0x414
  worker_thread+0x70/0x46c
  kthread+0xdc/0xe0
  ret_from_fork+0x10/0x20
 Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)

This happens because STA has time to disconnect and reconnect before
batadv_v_elp_throughput_metric_update() delayed work gets scheduled. In
this situation, ath10k_sta_state() can be in the middle of resetting
arsta data when the work queue get chance to be scheduled and ends up
accessing it. Locking wiphy prevents that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227792">SUSE bug 1227792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()

The ieee80211_sta_ps_deliver_wakeup() function takes sta-&gt;ps_lock to
synchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from
softirq context. However using only spin_lock() to get sta-&gt;ps_lock in
ieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute
on this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to
take this same lock ending in deadlock. Below is an example of rcu stall
that arises in such situation.

 rcu: INFO: rcu_sched self-detected stall on CPU
 rcu:    2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996
 rcu:    (t=42586894 jiffies g=2057 q=362405 ncpus=4)
 CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G        W          6.4.0-02158-g1b062f552873 #742
 Hardware name: RPT (r1) (DT)
 pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : queued_spin_lock_slowpath+0x58/0x2d0
 lr : invoke_tx_handlers_early+0x5b4/0x5c0
 sp : ffff00001ef64660
 x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8
 x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000
 x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000
 x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000
 x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80
 x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da
 x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440
 x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880
 x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000
 x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8
 Call trace:
  queued_spin_lock_slowpath+0x58/0x2d0
  ieee80211_tx+0x80/0x12c
  ieee80211_tx_pending+0x110/0x278
  tasklet_action_common.constprop.0+0x10c/0x144
  tasklet_action+0x20/0x28
  _stext+0x11c/0x284
  ____do_softirq+0xc/0x14
  call_on_irq_stack+0x24/0x34
  do_softirq_own_stack+0x18/0x20
  do_softirq+0x74/0x7c
  __local_bh_enable_ip+0xa0/0xa4
  _ieee80211_wake_txqs+0x3b0/0x4b8
  __ieee80211_wake_queue+0x12c/0x168
  ieee80211_add_pending_skbs+0xec/0x138
  ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480
  ieee80211_mps_sta_status_update.part.0+0xd8/0x11c
  ieee80211_mps_sta_status_update+0x18/0x24
  sta_apply_parameters+0x3bc/0x4c0
  ieee80211_change_station+0x1b8/0x2dc
  nl80211_set_station+0x444/0x49c
  genl_family_rcv_msg_doit.isra.0+0xa4/0xfc
  genl_rcv_msg+0x1b0/0x244
  netlink_rcv_skb+0x38/0x10c
  genl_rcv+0x34/0x48
  netlink_unicast+0x254/0x2bc
  netlink_sendmsg+0x190/0x3b4
  ____sys_sendmsg+0x1e8/0x218
  ___sys_sendmsg+0x68/0x8c
  __sys_sendmsg+0x44/0x84
  __arm64_sys_sendmsg+0x20/0x28
  do_el0_svc+0x6c/0xe8
  el0_svc+0x14/0x48
  el0t_64_sync_handler+0xb0/0xb4
  el0t_64_sync+0x14c/0x150

Using spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise
on the same CPU that is holding the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227790">SUSE bug 1227790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40916</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found

When reading EDID fails and driver reports no modes available, the DRM
core adds an artificial 1024x786 mode to the connector. Unfortunately
some variants of the Exynos HDMI (like the one in Exynos4 SoCs) are not
able to drive such mode, so report a safe 640x480 mode instead of nothing
in case of the EDID reading failure.

This fixes the following issue observed on Trats2 board since commit
13d5b040363c ("drm/exynos: do not return negative values from .get_modes()"):

[drm] Exynos DRM: using 11c00000.fimd device for DMA mapping operations
exynos-drm exynos-drm: bound 11c00000.fimd (ops fimd_component_ops)
exynos-drm exynos-drm: bound 12c10000.mixer (ops mixer_component_ops)
exynos-dsi 11c80000.dsi: [drm:samsung_dsim_host_attach] Attached s6e8aa0 device (lanes:4 bpp:24 mode-flags:0x10b)
exynos-drm exynos-drm: bound 11c80000.dsi (ops exynos_dsi_component_ops)
exynos-drm exynos-drm: bound 12d00000.hdmi (ops hdmi_component_ops)
[drm] Initialized exynos 1.1.0 20180330 for exynos-drm on minor 1
exynos-hdmi 12d00000.hdmi: [drm:hdmiphy_enable.part.0] *ERROR* PLL could not reach steady state
panel-samsung-s6e8aa0 11c80000.dsi.0: ID: 0xa2, 0x20, 0x8c
exynos-mixer 12c10000.mixer: timeout waiting for VSYNC
------------[ cut here ]------------
WARNING: CPU: 1 PID: 11 at drivers/gpu/drm/drm_atomic_helper.c:1682 drm_atomic_helper_wait_for_vblanks.part.0+0x2b0/0x2b8
[CRTC:70:crtc-1] vblank wait timed out
Modules linked in:
CPU: 1 PID: 11 Comm: kworker/u16:0 Not tainted 6.9.0-rc5-next-20240424 #14913
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound deferred_probe_work_func
Call trace:
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x68/0x88
 dump_stack_lvl from __warn+0x7c/0x1c4
 __warn from warn_slowpath_fmt+0x11c/0x1a8
 warn_slowpath_fmt from drm_atomic_helper_wait_for_vblanks.part.0+0x2b0/0x2b8
 drm_atomic_helper_wait_for_vblanks.part.0 from drm_atomic_helper_commit_tail_rpm+0x7c/0x8c
 drm_atomic_helper_commit_tail_rpm from commit_tail+0x9c/0x184
 commit_tail from drm_atomic_helper_commit+0x168/0x190
 drm_atomic_helper_commit from drm_atomic_commit+0xb4/0xe0
 drm_atomic_commit from drm_client_modeset_commit_atomic+0x23c/0x27c
 drm_client_modeset_commit_atomic from drm_client_modeset_commit_locked+0x60/0x1cc
 drm_client_modeset_commit_locked from drm_client_modeset_commit+0x24/0x40
 drm_client_modeset_commit from __drm_fb_helper_restore_fbdev_mode_unlocked+0x9c/0xc4
 __drm_fb_helper_restore_fbdev_mode_unlocked from drm_fb_helper_set_par+0x2c/0x3c
 drm_fb_helper_set_par from fbcon_init+0x3d8/0x550
 fbcon_init from visual_init+0xc0/0x108
 visual_init from do_bind_con_driver+0x1b8/0x3a4
 do_bind_con_driver from do_take_over_console+0x140/0x1ec
 do_take_over_console from do_fbcon_takeover+0x70/0xd0
 do_fbcon_takeover from fbcon_fb_registered+0x19c/0x1ac
 fbcon_fb_registered from register_framebuffer+0x190/0x21c
 register_framebuffer from __drm_fb_helper_initial_config_and_unlock+0x350/0x574
 __drm_fb_helper_initial_config_and_unlock from exynos_drm_fbdev_client_hotplug+0x6c/0xb0
 exynos_drm_fbdev_client_hotplug from drm_client_register+0x58/0x94
 drm_client_register from exynos_drm_bind+0x160/0x190
 exynos_drm_bind from try_to_bring_up_aggregate_device+0x200/0x2d8
 try_to_bring_up_aggregate_device from __component_add+0xb0/0x170
 __component_add from mixer_probe+0x74/0xcc
 mixer_probe from platform_probe+0x5c/0xb8
 platform_probe from really_probe+0xe0/0x3d8
 really_probe from __driver_probe_device+0x9c/0x1e4
 __driver_probe_device from driver_probe_device+0x30/0xc0
 driver_probe_device from __device_attach_driver+0xa8/0x120
 __device_attach_driver from bus_for_each_drv+0x80/0xcc
 bus_for_each_drv from __device_attach+0xac/0x1fc
 __device_attach from bus_probe_device+0x8c/0x90
 bus_probe_device from deferred_probe_work_func+0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227846">SUSE bug 1227846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()

In case of token is released due to token-&gt;state == BNXT_HWRM_DEFERRED,
released token (set to NULL) is used in log messages. This issue is
expected to be prevented by HWRM_ERR_CODE_PF_UNAVAILABLE error code. But
this error code is returned by recent firmware. So some firmware may not
return it. This may lead to NULL pointer dereference.
Adjust this issue by adding token pointer check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227779">SUSE bug 1227779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: disable rx data ring on dma allocation failure

When vmxnet3_rq_create() fails to allocate memory for rq-&gt;data_ring.base,
the subsequent call to vmxnet3_rq_destroy_all_rxdataring does not reset
rq-&gt;data_ring.desc_size for the data ring that failed, which presumably
causes the hypervisor to reference it on packet reception.

To fix this bug, rq-&gt;data_ring.desc_size needs to be set to 0 to tell
the hypervisor to disable this feature.

[   95.436876] kernel BUG at net/core/skbuff.c:207!
[   95.439074] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[   95.440411] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 6.9.3-dirty #1
[   95.441558] Hardware name: VMware, Inc. VMware Virtual
Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[   95.443481] RIP: 0010:skb_panic+0x4d/0x4f
[   95.444404] Code: 4f 70 50 8b 87 c0 00 00 00 50 8b 87 bc 00 00 00 50
ff b7 d0 00 00 00 4c 8b 8f c8 00 00 00 48 c7 c7 68 e8 be 9f e8 63 58 f9
ff &lt;0f&gt; 0b 48 8b 14 24 48 c7 c1 d0 73 65 9f e8 a1 ff ff ff 48 8b 14 24
[   95.447684] RSP: 0018:ffffa13340274dd0 EFLAGS: 00010246
[   95.448762] RAX: 0000000000000089 RBX: ffff8fbbc72b02d0 RCX: 000000000000083f
[   95.450148] RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f
[   95.451520] RBP: 000000000000002d R08: 0000000000000000 R09: ffffa13340274c60
[   95.452886] R10: ffffffffa04ed468 R11: 0000000000000002 R12: 0000000000000000
[   95.454293] R13: ffff8fbbdab3c2d0 R14: ffff8fbbdbd829e0 R15: ffff8fbbdbd809e0
[   95.455682] FS:  0000000000000000(0000) GS:ffff8fbeefd80000(0000) knlGS:0000000000000000
[   95.457178] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.458340] CR2: 00007fd0d1f650c8 CR3: 0000000115f28000 CR4: 00000000000406f0
[   95.459791] Call Trace:
[   95.460515]  &lt;IRQ&gt;
[   95.461180]  ? __die_body.cold+0x19/0x27
[   95.462150]  ? die+0x2e/0x50
[   95.462976]  ? do_trap+0xca/0x110
[   95.463973]  ? do_error_trap+0x6a/0x90
[   95.464966]  ? skb_panic+0x4d/0x4f
[   95.465901]  ? exc_invalid_op+0x50/0x70
[   95.466849]  ? skb_panic+0x4d/0x4f
[   95.467718]  ? asm_exc_invalid_op+0x1a/0x20
[   95.468758]  ? skb_panic+0x4d/0x4f
[   95.469655]  skb_put.cold+0x10/0x10
[   95.470573]  vmxnet3_rq_rx_complete+0x862/0x11e0 [vmxnet3]
[   95.471853]  vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3]
[   95.473185]  __napi_poll+0x2b/0x160
[   95.474145]  net_rx_action+0x2c6/0x3b0
[   95.475115]  handle_softirqs+0xe7/0x2a0
[   95.476122]  __irq_exit_rcu+0x97/0xb0
[   95.477109]  common_interrupt+0x85/0xa0
[   95.478102]  &lt;/IRQ&gt;
[   95.478846]  &lt;TASK&gt;
[   95.479603]  asm_common_interrupt+0x26/0x40
[   95.480657] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   95.481801] Code: 22 d7 e9 54 87 01 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 93 ba 3b 00 fb f4 &lt;e9&gt; 2c 87 01 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90
[   95.485563] RSP: 0018:ffffa133400ffe58 EFLAGS: 00000246
[   95.486882] RAX: 0000000000004000 RBX: ffff8fbbc1d14064 RCX: 0000000000000000
[   95.488477] RDX: ffff8fbeefd80000 RSI: ffff8fbbc1d14000 RDI: 0000000000000001
[   95.490067] RBP: ffff8fbbc1d14064 R08: ffffffffa0652260 R09: 00000000000010d3
[   95.491683] R10: 0000000000000018 R11: ffff8fbeefdb4764 R12: ffffffffa0652260
[   95.493389] R13: ffffffffa06522e0 R14: 0000000000000001 R15: 0000000000000000
[   95.495035]  acpi_safe_halt+0x14/0x20
[   95.496127]  acpi_idle_do_entry+0x2f/0x50
[   95.497221]  acpi_idle_enter+0x7f/0xd0
[   95.498272]  cpuidle_enter_state+0x81/0x420
[   95.499375]  cpuidle_enter+0x2d/0x40
[   95.500400]  do_idle+0x1e5/0x240
[   95.501385]  cpu_startup_entry+0x29/0x30
[   95.502422]  start_secondary+0x11c/0x140
[   95.503454]  common_startup_64+0x13e/0x141
[   95.504466]  &lt;/TASK&gt;
[   95.505197] Modules linked in: nft_fib_inet nft_fib_ipv4
nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6
nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ip
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227786">SUSE bug 1227786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/dpt: Make DPT object unshrinkable

In some scenarios, the DPT object gets shrunk but
the actual framebuffer did not and thus its still
there on the DPT's vm-&gt;bound_list. Then it tries to
rewrite the PTEs via a stale CPU mapping. This causes panic.

[vsyrjala: Add TODO comment]
(cherry picked from commit 51064d471c53dcc8eddd2333c3f1c1d9131ba36c)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227787">SUSE bug 1227787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40927</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Handle TD clearing for multiple streams case

When multiple streams are in use, multiple TDs might be in flight when
an endpoint is stopped. We need to issue a Set TR Dequeue Pointer for
each, to ensure everything is reset properly and the caches cleared.
Change the logic so that any N&gt;1 TDs found active for different streams
are deferred until after the first one is processed, calling
xhci_invalidate_cancelled_tds() again from xhci_handle_cmd_set_deq() to
queue another command until we are done with all of them. Also change
the error/"should never happen" paths to ensure we at least clear any
affected TDs, even if we can't issue a command to clear the hardware
cache, and complain loudly with an xhci_warn() if this ever happens.

This problem case dates back to commit e9df17eb1408 ("USB: xhci: Correct
assumptions about number of rings per endpoint.") early on in the XHCI
driver's life, when stream support was first added.
It was then identified but not fixed nor made into a warning in commit
674f8438c121 ("xhci: split handling halted endpoints into two steps"),
which added a FIXME comment for the problem case (without materially
changing the behavior as far as I can tell, though the new logic made
the problem more obvious).

Then later, in commit 94f339147fc3 ("xhci: Fix failure to give back some
cached cancelled URBs."), it was acknowledged again.

[Mathias: commit 94f339147fc3 ("xhci: Fix failure to give back some cached
cancelled URBs.") was a targeted regression fix to the previously mentioned
patch. Users reported issues with usb stuck after unmounting/disconnecting
UAS devices. This rolled back the TD clearing of multiple streams to its
original state.]

Apparently the commit author was aware of the problem (yet still chose
to submit it): It was still mentioned as a FIXME, an xhci_dbg() was
added to log the problem condition, and the remaining issue was mentioned
in the commit description. The choice of making the log type xhci_dbg()
for what is, at this point, a completely unhandled and known broken
condition is puzzling and unfortunate, as it guarantees that no actual
users would see the log in production, thereby making it nigh
undebuggable (indeed, even if you turn on DEBUG, the message doesn't
really hint at there being a problem at all).

It took me *months* of random xHC crashes to finally find a reliable
repro and be able to do a deep dive debug session, which could all have
been avoided had this unhandled, broken condition been actually reported
with a warning, as it should have been as a bug intentionally left in
unfixed (never mind that it shouldn't have been left in at all).

&gt; Another fix to solve clearing the caches of all stream rings with
&gt; cancelled TDs is needed, but not as urgent.

3 years after that statement and 14 years after the original bug was
introduced, I think it's finally time to fix it. And maybe next time
let's not leave bugs unfixed (that are actually worse than the original
bug), and let's actually get people to review kernel commits please.

Fixes xHC crashes and IOMMU faults with UAS devices when handling
errors/faults. Easiest repro is to use `hdparm` to mark an early sector
(e.g. 1024) on a disk as bad, then `cat /dev/sdX &gt; /dev/null` in a loop.
At least in the case of JMicron controllers, the read errors end up
having to cancel two TDs (for two queued requests to different streams)
and the one that didn't get cleared properly ends up faulting the xHC
entirely when it tries to access DMA pages that have since been unmapped,
referred to by the stale TDs. This normally happens quickly (after two
or three loops). After this fix, I left the `cat` in a loop running
overnight and experienced no xHC failures, with all read errors
recovered properly. Repro'd and tested on an Apple M1 Mac Mini
(dwc3 host).

On systems without an IOMMU, this bug would instead silently corrupt
freed memory, making this a
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227816">SUSE bug 1227816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: check n_ssids before accessing the ssids

In some versions of cfg80211, the ssids poinet might be a valid one even
though n_ssids is 0. Accessing the pointer in this case will cuase an
out-of-bound access. Fix this by checking n_ssids first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227774">SUSE bug 1227774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_una is properly initialized on connect

This is strictly related to commit fb7a0d334894 ("mptcp: ensure snd_nxt
is properly initialized on connect"). It turns out that syzkaller can
trigger the retransmit after fallback and before processing any other
incoming packet - so that snd_una is still left uninitialized.

Address the issue explicitly initializing snd_una together with snd_nxt
and write_seq.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227780">SUSE bug 1227780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/exynos/vidi: fix memory leak in .get_modes()

The duplicated EDID is never freed. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227828">SUSE bug 1227828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode()

Fix a memory leak on logi_dj_recv_send_report() error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227796">SUSE bug 1227796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40935</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: flush all requests after setting CACHEFILES_DEAD

In ondemand mode, when the daemon is processing an open request, if the
kernel flags the cache as CACHEFILES_DEAD, the cachefiles_daemon_write()
will always return -EIO, so the daemon can't pass the copen to the kernel.
Then the kernel process that is waiting for the copen triggers a hung_task.

Since the DEAD state is irreversible, it can only be exited by closing
/dev/cachefiles. Therefore, after calling cachefiles_io_error() to mark
the cache as CACHEFILES_DEAD, if in ondemand mode, flush all requests to
avoid the above hungtask. We may still be able to read some of the cached
data before closing the fd of /dev/cachefiles.

Note that this relies on the patch that adds reference counting to the req,
otherwise it may UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227797">SUSE bug 1227797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40937</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: Clear napi-&gt;skb before dev_kfree_skb_any()

gve_rx_free_skb incorrectly leaves napi-&gt;skb referencing an skb after it
is freed with dev_kfree_skb_any(). This can result in a subsequent call
to napi_get_frags returning a dangling pointer.

Fix this by clearing napi-&gt;skb before the skb is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227903">SUSE bug 1227903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40940</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix tainted pointer delete is case of flow rules creation fail

In case of flow rule creation fail in mlx5_lag_create_port_sel_table(),
instead of previously created rules, the tainted pointer is deleted
deveral times.
Fix this bug by using correct flow rules pointers.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227800">SUSE bug 1227800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40941</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't read past the mfuart notifcation

In case the firmware sends a notification that claims it has more data
than it has, we will read past that was allocated for the notification.
Remove the print of the buffer, we won't see it by default. If needed,
we can see the content with tracing.

This was reported by KFENCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227771">SUSE bug 1227771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40942</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects

The hwmp code use objects of type mesh_preq_queue, added to a list in
ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath
gets deleted, ex mesh interface is removed, the entries in that list will
never get cleaned. Fix this by flushing all corresponding items of the
preq_queue in mesh_path_flush_pending().

This should take care of KASAN reports like this:

unreferenced object 0xffff00000668d800 (size 128):
  comm "kworker/u8:4", pid 67, jiffies 4295419552 (age 1836.444s)
  hex dump (first 32 bytes):
    00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff  ..........h.....
    8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00  ....&gt;...........
  backtrace:
    [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c
    [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80
    [&lt;0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8
    [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c
    [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4
    [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764
    [&lt;000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4
    [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440
    [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c
    [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4
    [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508
    [&lt;00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c
    [&lt;00000000b36425d1&gt;] worker_thread+0x9c/0x634
    [&lt;0000000005852dd5&gt;] kthread+0x1bc/0x1c4
    [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20
unreferenced object 0xffff000009051f00 (size 128):
  comm "kworker/u8:4", pid 67, jiffies 4295419553 (age 1836.440s)
  hex dump (first 32 bytes):
    90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff  ..........h.....
    36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff  6'.......Xy.....
  backtrace:
    [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c
    [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80
    [&lt;0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8
    [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c
    [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4
    [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764
    [&lt;000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4
    [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440
    [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c
    [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4
    [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508
    [&lt;00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c
    [&lt;00000000b36425d1&gt;] worker_thread+0x9c/0x634
    [&lt;0000000005852dd5&gt;] kthread+0x1bc/0x1c4
    [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227770">SUSE bug 1227770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40943</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix races between hole punching and AIO+DIO

After commit "ocfs2: return real error code in ocfs2_dio_wr_get_block",
fstests/generic/300 become from always failed to sometimes failed:

========================================================================
[  473.293420 ] run fstests generic/300

[  475.296983 ] JBD2: Ignoring recovery information on journal
[  475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) with ordered data mode.
[  494.290998 ] OCFS2: ERROR (device dm-1): ocfs2_change_extent_flag: Owner 5668 has an extent at cpos 78723 which can no longer be found
[  494.291609 ] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.
[  494.292018 ] OCFS2: File system is now read-only.
[  494.292224 ] (kworker/19:11,2628,19):ocfs2_mark_extent_written:5272 ERROR: status = -30
[  494.292602 ] (kworker/19:11,2628,19):ocfs2_dio_end_io_write:2374 ERROR: status = -3
fio: io_u error on file /mnt/scratch/racer: Read-only file system: write offset=460849152, buflen=131072
=========================================================================

In __blockdev_direct_IO, ocfs2_dio_wr_get_block is called to add unwritten
extents to a list.  extents are also inserted into extent tree in
ocfs2_write_begin_nolock.  Then another thread call fallocate to puch a
hole at one of the unwritten extent.  The extent at cpos was removed by
ocfs2_remove_extent().  At end io worker thread, ocfs2_search_extent_list
found there is no such extent at the cpos.

    T1                        T2                T3
                              inode lock
                                ...
                                insert extents
                                ...
                              inode unlock
ocfs2_fallocate
 __ocfs2_change_file_space
  inode lock
  lock ip_alloc_sem
  ocfs2_remove_inode_range inode
   ocfs2_remove_btree_range
    ocfs2_remove_extent
    ^---remove the extent at cpos 78723
  ...
  unlock ip_alloc_sem
  inode unlock
                                       ocfs2_dio_end_io
                                        ocfs2_dio_end_io_write
                                         lock ip_alloc_sem
                                         ocfs2_mark_extent_written
                                          ocfs2_change_extent_flag
                                           ocfs2_search_extent_list
                                           ^---failed to find extent
                                          ...
                                          unlock ip_alloc_sem

In most filesystems, fallocate is not compatible with racing with AIO+DIO,
so fix it by adding to wait for all dio before fallocate/punch_hole like
ext4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227849">SUSE bug 1227849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Return right value in iommu_sva_bind_device()

iommu_sva_bind_device() should return either a sva bond handle or an
ERR_PTR value in error cases. Existing drivers (idxd and uacce) only
check the return value with IS_ERR(). This could potentially lead to
a kernel NULL pointer dereference issue if the function returns NULL
instead of an error pointer.

In reality, this doesn't cause any problems because iommu_sva_bind_device()
only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.
In this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will
return an error, and the device drivers won't call iommu_sva_bind_device()
at all.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227802">SUSE bug 1227802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40953</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()

Use {READ,WRITE}_ONCE() to access kvm-&gt;last_boosted_vcpu to ensure the
loads and stores are atomic.  In the extremely unlikely scenario the
compiler tears the stores, it's theoretically possible for KVM to attempt
to get a vCPU using an out-of-bounds index, e.g. if the write is split
into multiple 8-bit stores, and is paired with a 32-bit load on a VM with
257 vCPUs:

  CPU0                              CPU1
  last_boosted_vcpu = 0xff;

                                    (last_boosted_vcpu = 0x100)
                                    last_boosted_vcpu[15:8] = 0x01;
  i = (last_boosted_vcpu = 0x1ff)
                                    last_boosted_vcpu[7:0] = 0x00;

  vcpu = kvm-&gt;vcpu_array[0x1ff];

As detected by KCSAN:

  BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]

  write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:
  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm
  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel
  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?
		 arch/x86/kvm/vmx/vmx.c:6606) kvm_intel
  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm
  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm
  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm
  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)
  __x64_sys_ioctl (fs/ioctl.c:890)
  x64_sys_call (arch/x86/entry/syscall_64.c:33)
  do_syscall_64 (arch/x86/entry/common.c:?)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

  read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:
  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm
  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel
  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?
			arch/x86/kvm/vmx/vmx.c:6606) kvm_intel
  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm
  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm
  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm
  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)
  __x64_sys_ioctl (fs/ioctl.c:890)
  x64_sys_call (arch/x86/entry/syscall_64.c:33)
  do_syscall_64 (arch/x86/entry/common.c:?)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

  value changed: 0x00000012 -&gt; 0x00000000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227806">SUSE bug 1227806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40954</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: do not leave a dangling sk pointer, when socket creation fails

It is possible to trigger a use-after-free by:
  * attaching an fentry probe to __sock_release() and the probe calling the
    bpf_get_socket_cookie() helper
  * running traceroute -I 1.1.1.1 on a freshly booted VM

A KASAN enabled kernel will log something like below (decoded and stripped):
==================================================================
BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
Read of size 8 at addr ffff888007110dd8 by task traceroute/299

CPU: 2 PID: 299 Comm: traceroute Tainted: G            E      6.10.0-rc2+ #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))
print_report (mm/kasan/report.c:378 mm/kasan/report.c:488)
? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
kasan_report (mm/kasan/report.c:603)
? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)
__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
bpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)
bpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e
bpf_trampoline_6442506592+0x47/0xaf
__sock_release (net/socket.c:652)
__sock_create (net/socket.c:1601)
...
Allocated by task 299 on cpu 2 at 78.328492s:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:68)
__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)
kmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)
sk_prot_alloc (net/core/sock.c:2075)
sk_alloc (net/core/sock.c:2134)
inet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)
__sock_create (net/socket.c:1572)
__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)
__x64_sys_socket (net/socket.c:1718)
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Freed by task 299 on cpu 2 at 78.328502s:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:68)
kasan_save_free_info (mm/kasan/generic.c:582)
poison_slab_object (mm/kasan/common.c:242)
__kasan_slab_free (mm/kasan/common.c:256)
kmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)
__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)
inet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)
__sock_create (net/socket.c:1572)
__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)
__x64_sys_socket (net/socket.c:1718)
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Fix this by clearing the struct socket reference in sk_common_release() to cover
all protocol families create functions, which may already attached the
reference to the sk object with sock_init_data().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228786">SUSE bug 1228786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40956</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list

Use list_for_each_entry_safe() to allow iterating through the list and
deleting the entry in the iteration process. The descriptor is freed via
idxd_desc_complete() and there's a slight chance may cause issue for
the list iterator when the descriptor is reused by another thread
without it being deleted from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228585">SUSE bug 1228585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40958</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netns: Make get_net_ns() handle zero refcount net

Syzkaller hit a warning:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0
Modules linked in:
CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0xdf/0x1d0
Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 &lt;0f&gt; 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1
RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac
RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001
RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139
R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4
R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040
FS:  00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0xa3/0xc0
 ? __warn+0xa5/0x1c0
 ? refcount_warn_saturate+0xdf/0x1d0
 ? report_bug+0x1fc/0x2d0
 ? refcount_warn_saturate+0xdf/0x1d0
 ? handle_bug+0xa1/0x110
 ? exc_invalid_op+0x3c/0xb0
 ? asm_exc_invalid_op+0x1f/0x30
 ? __warn_printk+0xcc/0x140
 ? __warn_printk+0xd5/0x140
 ? refcount_warn_saturate+0xdf/0x1d0
 get_net_ns+0xa4/0xc0
 ? __pfx_get_net_ns+0x10/0x10
 open_related_ns+0x5a/0x130
 __tun_chr_ioctl+0x1616/0x2370
 ? __sanitizer_cov_trace_switch+0x58/0xa0
 ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30
 ? __pfx_tun_chr_ioctl+0x10/0x10
 tun_chr_ioctl+0x2f/0x40
 __x64_sys_ioctl+0x11b/0x160
 x64_sys_call+0x1211/0x20d0
 do_syscall_64+0x9e/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5b28f165d7
Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8
RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7
RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0
R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730
R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;
Kernel panic - not syncing: kernel: panic_on_warn set ...

This is trigger as below:
          ns0                                    ns1
tun_set_iff() //dev is tun0
   tun-&gt;dev = dev
//ip link set tun0 netns ns1
                                       put_net() //ref is 0
__tun_chr_ioctl() //TUNGETDEVNETNS
   net = dev_net(tun-&gt;dev);
   open_related_ns(&amp;net-&gt;ns, get_net_ns); //ns1
     get_net_ns()
        get_net() //addition on 0

Use maybe_get_net() in get_net_ns in case net's ref is zero to fix this
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227812">SUSE bug 1227812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40959</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()

ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.

syzbot reported:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker
 RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64
Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00
RSP: 0018:ffffc90000117378 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7
RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98
RBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000
R10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]
  xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]
  xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541
  xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835
  xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]
  xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201
  xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]
  xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309
  ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256
  send6+0x611/0xd20 drivers/net/wireguard/socket.c:139
  wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178
  wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200
  wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40
  wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227884">SUSE bug 1227884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40960</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible NULL dereference in rt6_probe()

syzbot caught a NULL dereference in rt6_probe() [1]

Bail out if  __in6_dev_get() returns NULL.

[1]
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]
CPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
 RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]
 RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758
Code: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19
RSP: 0018:ffffc900034af070 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000
RDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c
RBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a
R13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000
FS:  00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784
  nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496
  __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825
  find_rr_leaf net/ipv6/route.c:853 [inline]
  rt6_select net/ipv6/route.c:897 [inline]
  fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195
  ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231
  pol_lookup_func include/net/ip6_fib.h:616 [inline]
  fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121
  ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]
  ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651
  ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147
  ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250
  rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898
  inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  sock_write_iter+0x4b8/0x5c0 net/socket.c:1160
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x6b6/0x1140 fs/read_write.c:590
  ksys_write+0x1f8/0x260 fs/read_write.c:643
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227813">SUSE bug 1227813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40961</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible NULL deref in fib6_nh_init()

syzbot reminds us that in6_dev_get() can return NULL.

fib6_nh_init()
    ip6_validate_gw(  &amp;idev  )
        ip6_route_check_nh(  idev  )
            *idev = in6_dev_get(dev); // can be NULL

Oops: general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]
CPU: 0 PID: 11237 Comm: syz-executor.3 Not tainted 6.10.0-rc2-syzkaller-00249-gbe27b8965297 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
 RIP: 0010:fib6_nh_init+0x640/0x2160 net/ipv6/route.c:3606
Code: 00 00 fc ff df 4c 8b 64 24 58 48 8b 44 24 28 4c 8b 74 24 30 48 89 c1 48 89 44 24 28 48 8d 98 e0 05 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 0f b6 04 38 84 c0 0f 85 b3 17 00 00 8b 1b 31 ff 89 de e8 b8 8b
RSP: 0018:ffffc900032775a0 EFLAGS: 00010202
RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000000000
RDX: 0000000000000010 RSI: ffffc90003277a54 RDI: ffff88802b3a08d8
RBP: ffffc900032778b0 R08: 00000000000002fc R09: 0000000000000000
R10: 00000000000002fc R11: 0000000000000000 R12: ffff88802b3a08b8
R13: 1ffff9200064eec8 R14: ffffc90003277a00 R15: dffffc0000000000
FS:  00007f940feb06c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000245e8000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  ip6_route_info_create+0x99e/0x12b0 net/ipv6/route.c:3809
  ip6_route_add+0x28/0x160 net/ipv6/route.c:3853
  ipv6_route_ioctl+0x588/0x870 net/ipv6/route.c:4483
  inet6_ioctl+0x21a/0x280 net/ipv6/af_inet6.c:579
  sock_do_ioctl+0x158/0x460 net/socket.c:1222
  sock_ioctl+0x629/0x8e0 net/socket.c:1341
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f940f07cea9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227814">SUSE bug 1227814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: lpi2c: Avoid calling clk_get_rate during transfer

Instead of repeatedly calling clk_get_rate for each transfer, lock
the clock rate and cache the value.
A deadlock has been observed while adding tlv320aic32x4 audio codec to
the system. When this clock provider adds its clock, the clk mutex is
locked already, it needs to access i2c, which in return needs the mutex
for clk_get_rate as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227885">SUSE bug 1227885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: add the option to have a tty reject a new ldisc

... and use it to limit the virtual terminals to just N_TTY.  They are
kind of special, and in particular, the "con_write()" routine violates
the "writes cannot sleep" rule that some ldiscs rely on.

This avoids the

   BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659

when N_GSM has been attached to a virtual console, and gsmld_write()
calls con_write() while holding a spinlock, and con_write() then tries
to get the console lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227886">SUSE bug 1227886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: imx: Introduce timeout when waiting on transmitter empty

By waiting at most 1 second for USR2_TXDC to be set, we avoid a potential
deadlock.

In case of the timeout, there is not much we can do, so we simply ignore
the transmitter state and optimistically try to continue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227891">SUSE bug 1227891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40970</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Avoid hw_desc array overrun in dw-axi-dmac

I have a use case where nr_buffers = 3 and in which each descriptor is composed by 3
segments, resulting in the DMA channel descs_allocated to be 9. Since axi_desc_put()
handles the hw_desc considering the descs_allocated, this scenario would result in a
kernel panic (hw_desc array will be overrun).

To fix this, the proposal is to add a new member to the axi_dma_desc structure,
where we keep the number of allocated hw_descs (axi_desc_alloc()) and use it in
axi_desc_put() to handle the hw_desc array correctly.

Additionally I propose to remove the axi_chan_start_first_queued() call after completing
the transfer, since it was identified that unbalance can occur (started descriptors can
be interrupted and transfer ignored due to DMA channel not being enabled).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227899">SUSE bug 1227899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40972</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: do not create EA inode under buffer lock

ext4_xattr_set_entry() creates new EA inodes while holding buffer lock
on the external xattr block. This is problematic as it nests all the
allocation locking (which acquires locks on other buffers) under the
buffer lock. This can even deadlock when the filesystem is corrupted and
e.g. quota file is setup to contain xattr block as data block. Move the
allocation of EA inode out of ext4_xattr_set_entry() into the callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227910">SUSE bug 1227910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40973</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mtk-vcodec: potential null pointer deference in SCP

The return value of devm_kzalloc() needs to be checked to avoid
NULL pointer deference. This is similar to CVE-2022-3113.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227890">SUSE bug 1227890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40976</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/lima: mask irqs in timeout path before hard reset

There is a race condition in which a rendering job might take just long
enough to trigger the drm sched job timeout handler but also still
complete before the hard reset is done by the timeout handler.
This runs into race conditions not expected by the timeout handler.
In some very specific cases it currently may result in a refcount
imbalance on lima_pm_idle, with a stack dump such as:

[10136.669170] WARNING: CPU: 0 PID: 0 at drivers/gpu/drm/lima/lima_devfreq.c:205 lima_devfreq_record_idle+0xa0/0xb0
...
[10136.669459] pc : lima_devfreq_record_idle+0xa0/0xb0
...
[10136.669628] Call trace:
[10136.669634]  lima_devfreq_record_idle+0xa0/0xb0
[10136.669646]  lima_sched_pipe_task_done+0x5c/0xb0
[10136.669656]  lima_gp_irq_handler+0xa8/0x120
[10136.669666]  __handle_irq_event_percpu+0x48/0x160
[10136.669679]  handle_irq_event+0x4c/0xc0

We can prevent that race condition entirely by masking the irqs at the
beginning of the timeout handler, at which point we give up on waiting
for that job entirely.
The irqs will be enabled again at the next hard reset which is already
done as a recovery by the timeout handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227893">SUSE bug 1227893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40977</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921s: fix potential hung tasks during chip recovery

During chip recovery (e.g. chip reset), there is a possible situation that
kernel worker reset_work is holding the lock and waiting for kernel thread
stat_worker to be parked, while stat_worker is waiting for the release of
the same lock.
It causes a deadlock resulting in the dumping of hung tasks messages and
possible rebooting of the device.

This patch prevents the execution of stat_worker during the chip recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227950">SUSE bug 1227950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40978</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix crash while reading debugfs attribute

The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly
on a __user pointer, which results into the crash.

To fix this issue, use a small local stack buffer for sprintf() and then
call simple_read_from_buffer(), which in turns make the copy_to_user()
call.

BUG: unable to handle page fault for address: 00007f4801111000
PGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0
Oops: 0002 [#1] PREEMPT SMP PTI
Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023
RIP: 0010:memcpy_orig+0xcd/0x130
RSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202
RAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f
RDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000
RBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572
R10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff
R13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af
FS:  00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1a/0x60
 ? page_fault_oops+0x183/0x510
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x22/0x30
 ? memcpy_orig+0xcd/0x130
 vsnprintf+0x102/0x4c0
 sprintf+0x51/0x80
 qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]
 full_proxy_read+0x50/0x80
 vfs_read+0xa5/0x2e0
 ? folio_add_new_anon_rmap+0x44/0xa0
 ? set_pte_at+0x15/0x30
 ? do_pte_missing+0x426/0x7f0
 ksys_read+0xa5/0xe0
 do_syscall_64+0x58/0x80
 ? __count_memcg_events+0x46/0x90
 ? count_memcg_event_mm+0x3d/0x60
 ? handle_mm_fault+0x196/0x2f0
 ? do_user_addr_fault+0x267/0x890
 ? exc_page_fault+0x69/0x150
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f4800f20b4d
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227929">SUSE bug 1227929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40980</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40980" ref_url="https://www.suse.com/security/cve/CVE-2024-40980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drop_monitor: replace spin_lock by raw_spin_lock

trace_drop_common() is called with preemption disabled, and it acquires
a spin_lock. This is problematic for RT kernels because spin_locks are
sleeping locks in this configuration, which causes the following splat:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 449, name: rcuc/47
preempt_count: 1, expected: 0
RCU nest depth: 2, expected: 2
5 locks held by rcuc/47/449:
 #0: ff1100086ec30a60 ((softirq_ctrl.lock)){+.+.}-{2:2}, at: __local_bh_disable_ip+0x105/0x210
 #1: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: rt_spin_lock+0xbf/0x130
 #2: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: __local_bh_disable_ip+0x11c/0x210
 #3: ffffffffb394a160 (rcu_callback){....}-{0:0}, at: rcu_do_batch+0x360/0xc70
 #4: ff1100086ee07520 (&amp;data-&gt;lock){+.+.}-{2:2}, at: trace_drop_common.constprop.0+0xb5/0x290
irq event stamp: 139909
hardirqs last  enabled at (139908): [&lt;ffffffffb1df2b33&gt;] _raw_spin_unlock_irqrestore+0x63/0x80
hardirqs last disabled at (139909): [&lt;ffffffffb19bd03d&gt;] trace_drop_common.constprop.0+0x26d/0x290
softirqs last  enabled at (139892): [&lt;ffffffffb07a1083&gt;] __local_bh_enable_ip+0x103/0x170
softirqs last disabled at (139898): [&lt;ffffffffb0909b33&gt;] rcu_cpu_kthread+0x93/0x1f0
Preemption disabled at:
[&lt;ffffffffb1de786b&gt;] rt_mutex_slowunlock+0xab/0x2e0
CPU: 47 PID: 449 Comm: rcuc/47 Not tainted 6.9.0-rc2-rt1+ #7
Hardware name: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 04/15/2022
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x8c/0xd0
 dump_stack+0x14/0x20
 __might_resched+0x21e/0x2f0
 rt_spin_lock+0x5e/0x130
 ? trace_drop_common.constprop.0+0xb5/0x290
 ? skb_queue_purge_reason.part.0+0x1bf/0x230
 trace_drop_common.constprop.0+0xb5/0x290
 ? preempt_count_sub+0x1c/0xd0
 ? _raw_spin_unlock_irqrestore+0x4a/0x80
 ? __pfx_trace_drop_common.constprop.0+0x10/0x10
 ? rt_mutex_slowunlock+0x26a/0x2e0
 ? skb_queue_purge_reason.part.0+0x1bf/0x230
 ? __pfx_rt_mutex_slowunlock+0x10/0x10
 ? skb_queue_purge_reason.part.0+0x1bf/0x230
 trace_kfree_skb_hit+0x15/0x20
 trace_kfree_skb+0xe9/0x150
 kfree_skb_reason+0x7b/0x110
 skb_queue_purge_reason.part.0+0x1bf/0x230
 ? __pfx_skb_queue_purge_reason.part.0+0x10/0x10
 ? mark_lock.part.0+0x8a/0x520
...

trace_drop_common() also disables interrupts, but this is a minor issue
because we could easily replace it with a local_lock.

Replace the spin_lock with raw_spin_lock to avoid sleeping in atomic
context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40980/">CVE-2024-40980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227937">SUSE bug 1227937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

batman-adv: bypass empty buckets in batadv_purge_orig_ref()

Many syzbot reports are pointing to soft lockups in
batadv_purge_orig_ref() [1]

Root cause is unknown, but we can avoid spending too much
time there and perhaps get more interesting reports.

[1]

watchdog: BUG: soft lockup - CPU#0 stuck for 27s! [kworker/u4:6:621]
Modules linked in:
irq event stamp: 6182794
 hardirqs last  enabled at (6182793): [&lt;ffff8000801dae10&gt;] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386
 hardirqs last disabled at (6182794): [&lt;ffff80008ad66a78&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
 hardirqs last disabled at (6182794): [&lt;ffff80008ad66a78&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
 softirqs last  enabled at (6182792): [&lt;ffff80008aab71c4&gt;] spin_unlock_bh include/linux/spinlock.h:396 [inline]
 softirqs last  enabled at (6182792): [&lt;ffff80008aab71c4&gt;] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287
 softirqs last disabled at (6182790): [&lt;ffff80008aab61dc&gt;] spin_lock_bh include/linux/spinlock.h:356 [inline]
 softirqs last disabled at (6182790): [&lt;ffff80008aab61dc&gt;] batadv_purge_orig_ref+0x164/0x1228 net/batman-adv/originator.c:1271
CPU: 0 PID: 621 Comm: kworker/u4:6 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_purge_orig
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline]
 pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388
 lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386
sp : ffff800099007970
x29: ffff800099007980 x28: 1fffe00018fce1bd x27: dfff800000000000
x26: ffff0000d2620008 x25: ffff0000c7e70de8 x24: 0000000000000001
x23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4
x20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: 1fffe0001a817bb0
x17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001
x14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000003
x11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 00000000005e5789 x7 : ffff80008aab61dc x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800125414000
Call trace:
  __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline]
  arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline]
  __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:386
  __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
  _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210
  spin_unlock_bh include/linux/spinlock.h:396 [inline]
  batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287
  batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300
  process_one_work+0x694/0x1204 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x938/0xef4 kernel/workqueue.c:2787
  kthread+0x288/0x310 kernel/kthread.c:388
  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:51
 lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:103
sp : ffff800093a17d30
x29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4
x26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002
x23: 1ffff00011d93a74 x22: ffff80008ec9d3a0 x21: 0000000000000000
x20: ffff0000c19dbc00 x19: ffff8000802d0fd8 x18: 1fffe00036804396
x17: ffff80008ec9d000 x16: ffff8000802d089c x15: 0000000000000001
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227864">SUSE bug 1227864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ssb: Fix potential NULL pointer dereference in ssb_device_uevent()

The ssb_device_uevent() function first attempts to convert the 'dev' pointer
to 'struct ssb_device *'. However, it mistakenly dereferences 'dev' before
performing the NULL check, potentially leading to a NULL pointer
dereference if 'dev' is NULL.

To fix this issue, move the NULL check before dereferencing the 'dev' pointer,
ensuring that the pointer is valid before attempting to use it.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227865">SUSE bug 1227865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40983</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: force a dst refcount before doing decryption

As it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before
entering the xfrm type handlers"):

"Crypto requests might return asynchronous. In this case we leave the
 rcu protected region, so force a refcount on the skb's destination
 entry before we enter the xfrm type input/output handlers."

On TIPC decryption path it has the same problem, and skb_dst_force()
should be called before doing decryption to avoid a possible crash.

Shuang reported this issue when this warning is triggered:

  [] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc]
  [] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug
  [] Workqueue: crypto cryptd_queue_worker
  [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc]
  [] Call Trace:
  [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc]
  [] tipc_rcv+0xcf5/0x1060 [tipc]
  [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc]
  [] cryptd_aead_crypt+0xdb/0x190
  [] cryptd_queue_worker+0xed/0x190
  [] process_one_work+0x93d/0x17e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227819">SUSE bug 1227819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40984</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."

Undo the modifications made in commit d410ee5109a1 ("ACPICA: avoid
"Info: mapping multiple BARs. Your kernel is fine.""). The initial
purpose of this commit was to stop memory mappings for operation
regions from overlapping page boundaries, as it can trigger warnings
if different page attributes are present.

However, it was found that when this situation arises, mapping
continues until the boundary's end, but there is still an attempt to
read/write the entire length of the map, leading to a NULL pointer
deference. For example, if a four-byte mapping request is made but
only one byte is mapped because it hits the current page boundary's
end, a four-byte read/write attempt is still made, resulting in a NULL
pointer deference.

Instead, map the entire length, as the ACPI specification does not
mandate that it must be within the same page boundary. It is
permissible for it to be mapped across different regions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227820">SUSE bug 1227820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40987</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix UBSAN warning in kv_dpm.c

Adds bounds check for sumo_vid_mapping_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228235">SUSE bug 1228235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40988</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix UBSAN warning in kv_dpm.c

Adds bounds check for sumo_vid_mapping_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227957">SUSE bug 1227957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Disassociate vcpus from redistributor region on teardown

When tearing down a redistributor region, make sure we don't have
any dangling pointer to that region stored in a vcpu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228589">SUSE bug 1228589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40990</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Add check for srq max_sge attribute

max_sge attribute is passed by the user, and is inserted and used
unchecked, so verify that the value doesn't exceed maximum allowed value
before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227824">SUSE bug 1227824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40994</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: fix integer overflow in max_vclocks_store

On 32bit systems, the "4 * max" multiply can overflow.  Use kcalloc()
to do the allocation to prevent this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228587">SUSE bug 1228587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()

syzbot found hanging tasks waiting on rtnl_lock [1]

A reproducer is available in the syzbot bug.

When a request to add multiple actions with the same index is sent, the
second request will block forever on the first request. This holds
rtnl_lock, and causes tasks to hang.

Return -EAGAIN to prevent infinite looping, while keeping documented
behavior.

[1]

INFO: task kworker/1:0:5088 blocked for more than 143 seconds.
Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
&lt;TASK&gt;
context_switch kernel/sched/core.c:5409 [inline]
__schedule+0xf15/0x5d00 kernel/sched/core.c:6746
__schedule_loop kernel/sched/core.c:6823 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6838
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
wiphy_lock include/net/cfg80211.h:5953 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227830">SUSE bug 1227830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40997</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: fix memory leak on CPU EPP exit

The cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is
not freed in the analogous exit function, so fix that.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227853">SUSE bug 1227853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40998</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super()

In the following concurrency we will access the uninitialized rs-&gt;lock:

ext4_fill_super
  ext4_register_sysfs
   // sysfs registered msg_ratelimit_interval_ms
                             // Other processes modify rs-&gt;interval to
                             // non-zero via msg_ratelimit_interval_ms
  ext4_orphan_cleanup
    ext4_msg(sb, KERN_INFO, "Errors on filesystem, "
      __ext4_msg
        ___ratelimit(&amp;(EXT4_SB(sb)-&gt;s_msg_ratelimit_state)
          if (!rs-&gt;interval)  // do nothing if interval is 0
            return 1;
          raw_spin_trylock_irqsave(&amp;rs-&gt;lock, flags)
            raw_spin_trylock(lock)
              _raw_spin_trylock
                __raw_spin_trylock
                  spin_acquire(&amp;lock-&gt;dep_map, 0, 1, _RET_IP_)
                    lock_acquire
                      __lock_acquire
                        register_lock_class
                          assign_lock_key
                            dump_stack();
  ratelimit_state_init(&amp;sbi-&gt;s_msg_ratelimit_state, 5 * HZ, 10);
    raw_spin_lock_init(&amp;rs-&gt;lock);
    // init rs-&gt;lock here

and get the following dump_stack:

=========================================================
INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504
[...]
Call Trace:
 dump_stack_lvl+0xc5/0x170
 dump_stack+0x18/0x30
 register_lock_class+0x740/0x7c0
 __lock_acquire+0x69/0x13a0
 lock_acquire+0x120/0x450
 _raw_spin_trylock+0x98/0xd0
 ___ratelimit+0xf6/0x220
 __ext4_msg+0x7f/0x160 [ext4]
 ext4_orphan_cleanup+0x665/0x740 [ext4]
 __ext4_fill_super+0x21ea/0x2b10 [ext4]
 ext4_fill_super+0x14d/0x360 [ext4]
[...]
=========================================================

Normally interval is 0 until s_msg_ratelimit_state is initialized, so
___ratelimit() does nothing. But registering sysfs precedes initializing
rs-&gt;lock, so it is possible to change rs-&gt;interval to a non-zero value
via the msg_ratelimit_interval_ms interface of sysfs while rs-&gt;lock is
uninitialized, and then a call to ext4_msg triggers the problem by
accessing an uninitialized rs-&gt;lock. Therefore register sysfs after all
initializations are complete to avoid such problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227866">SUSE bug 1227866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40999</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ena: Add validation for completion descriptors consistency

Validate that `first` flag is set only for the first
descriptor in multi-buffer packets.
In case of an invalid descriptor, a reset will occur.
A new reset reason for RX data corruption has been added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227913">SUSE bug 1227913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block/ioctl: prefer different overflow check

Running syzkaller with the newly reintroduced signed integer overflow
sanitizer shows this report:

[   62.982337] ------------[ cut here ]------------
[   62.985692] cgroup: Invalid name
[   62.986211] UBSAN: signed-integer-overflow in ../block/ioctl.c:36:46
[   62.989370] 9pnet_fd: p9_fd_create_tcp (7343): problem connecting socket to 127.0.0.1
[   62.992992] 9223372036854775807 + 4095 cannot be represented in type 'long long'
[   62.997827] 9pnet_fd: p9_fd_create_tcp (7345): problem connecting socket to 127.0.0.1
[   62.999369] random: crng reseeded on system resumption
[   63.000634] GUP no longer grows the stack in syz-executor.2 (7353): 20002000-20003000 (20001000)
[   63.000668] CPU: 0 PID: 7353 Comm: syz-executor.2 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1
[   63.000677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   63.000682] Call Trace:
[   63.000686]  &lt;TASK&gt;
[   63.000731]  dump_stack_lvl+0x93/0xd0
[   63.000919]  __get_user_pages+0x903/0xd30
[   63.001030]  __gup_longterm_locked+0x153e/0x1ba0
[   63.001041]  ? _raw_read_unlock_irqrestore+0x17/0x50
[   63.001072]  ? try_get_folio+0x29c/0x2d0
[   63.001083]  internal_get_user_pages_fast+0x1119/0x1530
[   63.001109]  iov_iter_extract_pages+0x23b/0x580
[   63.001206]  bio_iov_iter_get_pages+0x4de/0x1220
[   63.001235]  iomap_dio_bio_iter+0x9b6/0x1410
[   63.001297]  __iomap_dio_rw+0xab4/0x1810
[   63.001316]  iomap_dio_rw+0x45/0xa0
[   63.001328]  ext4_file_write_iter+0xdde/0x1390
[   63.001372]  vfs_write+0x599/0xbd0
[   63.001394]  ksys_write+0xc8/0x190
[   63.001403]  do_syscall_64+0xd4/0x1b0
[   63.001421]  ? arch_exit_to_user_mode_prepare+0x3a/0x60
[   63.001479]  entry_SYSCALL_64_after_hwframe+0x6f/0x77
[   63.001535] RIP: 0033:0x7f7fd3ebf539
[   63.001551] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   63.001562] RSP: 002b:00007f7fd32570c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   63.001584] RAX: ffffffffffffffda RBX: 00007f7fd3ff3f80 RCX: 00007f7fd3ebf539
[   63.001590] RDX: 4db6d1e4f7e43360 RSI: 0000000020000000 RDI: 0000000000000004
[   63.001595] RBP: 00007f7fd3f1e496 R08: 0000000000000000 R09: 0000000000000000
[   63.001599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   63.001604] R13: 0000000000000006 R14: 00007f7fd3ff3f80 R15: 00007ffd415ad2b8
...
[   63.018142] ---[ end trace ]---

Historically, the signed integer overflow sanitizer did not work in the
kernel due to its interaction with `-fwrapv` but this has since been
changed [1] in the newest version of Clang; It was re-enabled in the
kernel with Commit 557f8c582a9ba8ab ("ubsan: Reintroduce signed overflow
sanitizer").

Let's rework this overflow checking logic to not actually perform an
overflow during the check itself, thus avoiding the UBSAN splat.

[1]: https://github.com/llvm/llvm-project/pull/82432
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227867">SUSE bug 1227867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41002</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/sec - Fix memory leak for sec resource release

The AIV is one of the SEC resources. When releasing resources,
it need to release the AIV resources at the same time.
Otherwise, memory leakage occurs.

The aiv resource release is added to the sec resource release
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227870">SUSE bug 1227870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41004</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Build event generation tests only as modules

The kprobes and synth event generation test modules add events and lock
(get a reference) those event file reference in module init function,
and unlock and delete it in module exit function. This is because those
are designed for playing as modules.

If we make those modules as built-in, those events are left locked in the
kernel, and never be removed. This causes kprobe event self-test failure
as below.

[   97.349708] ------------[ cut here ]------------
[   97.353453] WARNING: CPU: 3 PID: 1 at kernel/trace/trace_kprobe.c:2133 kprobe_trace_self_tests_init+0x3f1/0x480
[   97.357106] Modules linked in:
[   97.358488] CPU: 3 PID: 1 Comm: swapper/0 Not tainted 6.9.0-g699646734ab5-dirty #14
[   97.361556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
[   97.363880] RIP: 0010:kprobe_trace_self_tests_init+0x3f1/0x480
[   97.365538] Code: a8 24 08 82 e9 ae fd ff ff 90 0f 0b 90 48 c7 c7 e5 aa 0b 82 e9 ee fc ff ff 90 0f 0b 90 48 c7 c7 2d 61 06 82 e9 8e fd ff ff 90 &lt;0f&gt; 0b 90 48 c7 c7 33 0b 0c 82 89 c6 e8 6e 03 1f ff 41 ff c7 e9 90
[   97.370429] RSP: 0000:ffffc90000013b50 EFLAGS: 00010286
[   97.371852] RAX: 00000000fffffff0 RBX: ffff888005919c00 RCX: 0000000000000000
[   97.373829] RDX: ffff888003f40000 RSI: ffffffff8236a598 RDI: ffff888003f40a68
[   97.375715] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
[   97.377675] R10: ffffffff811c9ae5 R11: ffffffff8120c4e0 R12: 0000000000000000
[   97.379591] R13: 0000000000000001 R14: 0000000000000015 R15: 0000000000000000
[   97.381536] FS:  0000000000000000(0000) GS:ffff88807dcc0000(0000) knlGS:0000000000000000
[   97.383813] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   97.385449] CR2: 0000000000000000 CR3: 0000000002244000 CR4: 00000000000006b0
[   97.387347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   97.389277] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   97.391196] Call Trace:
[   97.391967]  &lt;TASK&gt;
[   97.392647]  ? __warn+0xcc/0x180
[   97.393640]  ? kprobe_trace_self_tests_init+0x3f1/0x480
[   97.395181]  ? report_bug+0xbd/0x150
[   97.396234]  ? handle_bug+0x3e/0x60
[   97.397311]  ? exc_invalid_op+0x1a/0x50
[   97.398434]  ? asm_exc_invalid_op+0x1a/0x20
[   97.399652]  ? trace_kprobe_is_busy+0x20/0x20
[   97.400904]  ? tracing_reset_all_online_cpus+0x15/0x90
[   97.402304]  ? kprobe_trace_self_tests_init+0x3f1/0x480
[   97.403773]  ? init_kprobe_trace+0x50/0x50
[   97.404972]  do_one_initcall+0x112/0x240
[   97.406113]  do_initcall_level+0x95/0xb0
[   97.407286]  ? kernel_init+0x1a/0x1a0
[   97.408401]  do_initcalls+0x3f/0x70
[   97.409452]  kernel_init_freeable+0x16f/0x1e0
[   97.410662]  ? rest_init+0x1f0/0x1f0
[   97.411738]  kernel_init+0x1a/0x1a0
[   97.412788]  ret_from_fork+0x39/0x50
[   97.413817]  ? rest_init+0x1f0/0x1f0
[   97.414844]  ret_from_fork_asm+0x11/0x20
[   97.416285]  &lt;/TASK&gt;
[   97.417134] irq event stamp: 13437323
[   97.418376] hardirqs last  enabled at (13437337): [&lt;ffffffff8110bc0c&gt;] console_unlock+0x11c/0x150
[   97.421285] hardirqs last disabled at (13437370): [&lt;ffffffff8110bbf1&gt;] console_unlock+0x101/0x150
[   97.423838] softirqs last  enabled at (13437366): [&lt;ffffffff8108e17f&gt;] handle_softirqs+0x23f/0x2a0
[   97.426450] softirqs last disabled at (13437393): [&lt;ffffffff8108e346&gt;] __irq_exit_rcu+0x66/0xd0
[   97.428850] ---[ end trace 0000000000000000 ]---

And also, since we can not cleanup dynamic_event file, ftracetest are
failed too.

To avoid these issues, build these tests only as modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227851">SUSE bug 1227851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netrom: Fix a memory leak in nr_heartbeat_expiry()

syzbot reported a memory leak in nr_create() [0].

Commit 409db27e3a2e ("netrom: Fix use-after-free of a listening socket.")
added sock_hold() to the nr_heartbeat_expiry() function, where
a) a socket has a SOCK_DESTROY flag or
b) a listening socket has a SOCK_DEAD flag.

But in the case "a," when the SOCK_DESTROY flag is set, the file descriptor
has already been closed and the nr_release() function has been called.
So it makes no sense to hold the reference count because no one will
call another nr_destroy_socket() and put it as in the case "b."

nr_connect
  nr_establish_data_link
    nr_start_heartbeat

nr_release
  switch (nr-&gt;state)
  case NR_STATE_3
    nr-&gt;state = NR_STATE_2
    sock_set_flag(sk, SOCK_DESTROY);

                        nr_rx_frame
                          nr_process_rx_frame
                            switch (nr-&gt;state)
                            case NR_STATE_2
                              nr_state2_machine()
                                nr_disconnect()
                                  nr_sk(sk)-&gt;state = NR_STATE_0
                                  sock_set_flag(sk, SOCK_DEAD)

                        nr_heartbeat_expiry
                          switch (nr-&gt;state)
                          case NR_STATE_0
                            if (sock_flag(sk, SOCK_DESTROY) ||
                               (sk-&gt;sk_state == TCP_LISTEN
                                 &amp;&amp; sock_flag(sk, SOCK_DEAD)))
                               sock_hold()  // ( !!! )
                               nr_destroy_socket()

To fix the memory leak, let's call sock_hold() only for a listening socket.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller.

[0]: https://syzkaller.appspot.com/bug?extid=d327a1f3b12e1e206c16
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227862">SUSE bug 1227862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: avoid too many retransmit packets

If a TCP socket is using TCP_USER_TIMEOUT, and the other peer
retracted its window to zero, tcp_retransmit_timer() can
retransmit a packet every two jiffies (2 ms for HZ=1000),
for about 4 minutes after TCP_USER_TIMEOUT has 'expired'.

The fix is to make sure tcp_rtx_probe0_timed_out() takes
icsk-&gt;icsk_user_timeout into account.

Before blamed commit, the socket would not timeout after
icsk-&gt;icsk_user_timeout, but would use standard exponential
backoff for the retransmits.

Also worth noting that before commit e89688e3e978 ("net: tcp:
fix unexcepted socket die when snd_wnd is 0"), the issue
would last 2 minutes instead of 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227863">SUSE bug 1227863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41009</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix overrunning reservations in ringbuf

The BPF ring buffer internally is implemented as a power-of-2 sized circular
buffer, with two logical and ever-increasing counters: consumer_pos is the
consumer counter to show which logical position the consumer consumed the
data, and producer_pos which is the producer counter denoting the amount of
data reserved by all producers.

Each time a record is reserved, the producer that "owns" the record will
successfully advance producer counter. In user space each time a record is
read, the consumer of the data advanced the consumer counter once it finished
processing. Both counters are stored in separate pages so that from user
space, the producer counter is read-only and the consumer counter is read-write.

One aspect that simplifies and thus speeds up the implementation of both
producers and consumers is how the data area is mapped twice contiguously
back-to-back in the virtual memory, allowing to not take any special measures
for samples that have to wrap around at the end of the circular buffer data
area, because the next page after the last data page would be first data page
again, and thus the sample will still appear completely contiguous in virtual
memory.

Each record has a struct bpf_ringbuf_hdr { u32 len; u32 pg_off; } header for
book-keeping the length and offset, and is inaccessible to the BPF program.
Helpers like bpf_ringbuf_reserve() return `(void *)hdr + BPF_RINGBUF_HDR_SZ`
for the BPF program to use. Bing-Jhong and Muhammad reported that it is however
possible to make a second allocated memory chunk overlapping with the first
chunk and as a result, the BPF program is now able to edit first chunk's
header.

For example, consider the creation of a BPF_MAP_TYPE_RINGBUF map with size
of 0x4000. Next, the consumer_pos is modified to 0x3000 /before/ a call to
bpf_ringbuf_reserve() is made. This will allocate a chunk A, which is in
[0x0,0x3008], and the BPF program is able to edit [0x8,0x3008]. Now, lets
allocate a chunk B with size 0x3000. This will succeed because consumer_pos
was edited ahead of time to pass the `new_prod_pos - cons_pos &gt; rb-&gt;mask`
check. Chunk B will be in range [0x3008,0x6010], and the BPF program is able
to edit [0x3010,0x6010]. Due to the ring buffer memory layout mentioned
earlier, the ranges [0x0,0x4000] and [0x4000,0x8000] point to the same data
pages. This means that chunk B at [0x4000,0x4008] is chunk A's header.
bpf_ringbuf_submit() / bpf_ringbuf_discard() use the header's pg_off to then
locate the bpf_ringbuf itself via bpf_ringbuf_restore_from_rec(). Once chunk
B modified chunk A's header, then bpf_ringbuf_commit() refers to the wrong
page and could cause a crash.

Fix it by calculating the oldest pending_pos and check whether the range
from the oldest outstanding record to the newest would span beyond the ring
buffer size. If that is the case, then reject the request. We've tested with
the ring buffer benchmark in BPF selftests (./benchs/run_bench_ringbufs.sh)
before/after the fix and while it seems a bit slower on some benchmarks, it
is still not significantly enough to matter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41011</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: don't allow mapping the MMIO HDP page with large pages

We don't get the right offset in that case.  The GPU has
an unused 4K area of the register BAR space into which you can
remap registers.  We remap the HDP flush registers into this
space to allow userspace (CPU or GPU) to flush the HDP when it
updates VRAM.  However, on systems with &gt;4K pages, we end up
exposing PAGE_SIZE of MMIO space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228115">SUSE bug 1228115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41012</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filelock: Remove locks reliably when fcntl/close race is detected

When fcntl_setlk() races with close(), it removes the created lock with
do_lock_file_wait().
However, LSMs can allow the first do_lock_file_wait() that created the lock
while denying the second do_lock_file_wait() that tries to remove the lock.
Separately, posix_lock_file() could also fail to
remove a lock due to GFP_KERNEL allocation failure (when splitting a range
in the middle).

After the bug has been triggered, use-after-free reads will occur in
lock_get_status() when userspace reads /proc/locks. This can likely be used
to read arbitrary kernel memory, but can't corrupt kernel memory.

Fix it by calling locks_remove_posix() instead, which is designed to
reliably get rid of POSIX locks associated with the given file and
files_struct and is also used by filp_flush().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41013</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: don't walk off the end of a directory data block

This adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry
to make sure don't stray beyond valid memory region. Before patching, the
loop simply checks that the start offset of the dup and dep is within the
range. So in a crafted image, if last entry is xfs_dir2_data_unused, we
can change dup-&gt;length to dup-&gt;length-1 and leave 1 byte of space. In the
next traversal, this space will be considered as dup or dep. We may
encounter an out of bound read when accessing the fixed members.

In the patch, we make sure that the remaining bytes large enough to hold
an unused entry before accessing xfs_dir2_data_unused and
xfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make
sure that the remaining bytes large enough to hold a dirent with a
single-byte name before accessing xfs_dir2_data_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228405">SUSE bug 1228405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41014</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: add bounds checking to xlog_recover_process_data

There is a lack of verification of the space occupied by fixed members
of xlog_op_header in the xlog_recover_process_data.

We can create a crafted image to trigger an out of bounds read by
following these steps:
    1) Mount an image of xfs, and do some file operations to leave records
    2) Before umounting, copy the image for subsequent steps to simulate
       abnormal exit. Because umount will ensure that tail_blk and
       head_blk are the same, which will result in the inability to enter
       xlog_recover_process_data
    3) Write a tool to parse and modify the copied image in step 2
    4) Make the end of the xlog_op_header entries only 1 byte away from
       xlog_rec_header-&gt;h_size
    5) xlog_rec_header-&gt;h_num_logops++
    6) Modify xlog_rec_header-&gt;h_crc

Fix:
Add a check to make sure there is sufficient space to access fixed members
of xlog_op_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228408">SUSE bug 1228408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41015</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: add bounds checking to ocfs2_check_dir_entry()

This adds sanity checks for ocfs2_dir_entry to make sure all members of
ocfs2_dir_entry don't stray beyond valid memory region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228409">SUSE bug 1228409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()

xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested.  It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41017</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: don't walk off the end of ealist

Add a check before visiting the members of ea to
make sure each ea stays within the ealist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228403">SUSE bug 1228403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41020</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filelock: Fix fcntl/close race recovery compat path

When I wrote commit 3cad1bc01041 ("filelock: Remove locks reliably when
fcntl/close race is detected"), I missed that there are two copies of the
code I was patching: The normal version, and the version for 64-bit offsets
on 32-bit kernels.
Thanks to Greg KH for stumbling over this while doing the stable
backport...

Apply exactly the same fix to the compat path for 32-bit kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228427">SUSE bug 1228427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41022</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()

The "instance" variable needs to be signed for the error handling to work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228429">SUSE bug 1228429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41023</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/deadline: Fix task_struct reference leak

During the execution of the following stress test with linux-rt:

stress-ng --cyclic 30 --timeout 30 --minimize --quiet

kmemleak frequently reported a memory leak concerning the task_struct:

unreferenced object 0xffff8881305b8000 (size 16136):
  comm "stress-ng", pid 614, jiffies 4294883961 (age 286.412s)
  object hex dump (first 32 bytes):
    02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .@..............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  debug hex dump (first 16 bytes):
    53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00  S...............
  backtrace:
    [&lt;00000000046b6790&gt;] dup_task_struct+0x30/0x540
    [&lt;00000000c5ca0f0b&gt;] copy_process+0x3d9/0x50e0
    [&lt;00000000ced59777&gt;] kernel_clone+0xb0/0x770
    [&lt;00000000a50befdc&gt;] __do_sys_clone+0xb6/0xf0
    [&lt;000000001dbf2008&gt;] do_syscall_64+0x5d/0xf0
    [&lt;00000000552900ff&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

The issue occurs in start_dl_timer(), which increments the task_struct
reference count and sets a timer. The timer callback, dl_task_timer,
is supposed to decrement the reference count upon expiration. However,
if enqueue_task_dl() is called before the timer expires and cancels it,
the reference count is not decremented, leading to the leak.

This patch fixes the reference leak by ensuring the task_struct
reference count is properly decremented when the timer is canceled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228430">SUSE bug 1228430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41035</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor

Syzbot has identified a bug in usbcore (see the Closes: tag below)
caused by our assumption that the reserved bits in an endpoint
descriptor's bEndpointAddress field will always be 0.  As a result of
the bug, the endpoint_is_duplicate() routine in config.c (and possibly
other routines as well) may believe that two descriptors are for
distinct endpoints, even though they have the same direction and
endpoint number.  This can lead to confusion, including the bug
identified by syzbot (two descriptors with matching endpoint numbers
and directions, where one was interrupt and the other was bulk).

To fix the bug, we will clear the reserved bits in bEndpointAddress
when we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1
specs say these bits are "Reserved, reset to zero".)  This requires us
to make a copy of the descriptor earlier in usb_parse_endpoint() and
use the copy instead of the original when checking for duplicates.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228485">SUSE bug 1228485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41036</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ks8851: Fix deadlock with the SPI chip variant

When SMP is enabled and spinlocks are actually functional then there is
a deadlock with the 'statelock' spinlock between ks8851_start_xmit_spi
and ks8851_irq:

    watchdog: BUG: soft lockup - CPU#0 stuck for 27s!
    call trace:
      queued_spin_lock_slowpath+0x100/0x284
      do_raw_spin_lock+0x34/0x44
      ks8851_start_xmit_spi+0x30/0xb8
      ks8851_start_xmit+0x14/0x20
      netdev_start_xmit+0x40/0x6c
      dev_hard_start_xmit+0x6c/0xbc
      sch_direct_xmit+0xa4/0x22c
      __qdisc_run+0x138/0x3fc
      qdisc_run+0x24/0x3c
      net_tx_action+0xf8/0x130
      handle_softirqs+0x1ac/0x1f0
      __do_softirq+0x14/0x20
      ____do_softirq+0x10/0x1c
      call_on_irq_stack+0x3c/0x58
      do_softirq_own_stack+0x1c/0x28
      __irq_exit_rcu+0x54/0x9c
      irq_exit_rcu+0x10/0x1c
      el1_interrupt+0x38/0x50
      el1h_64_irq_handler+0x18/0x24
      el1h_64_irq+0x64/0x68
      __netif_schedule+0x6c/0x80
      netif_tx_wake_queue+0x38/0x48
      ks8851_irq+0xb8/0x2c8
      irq_thread_fn+0x2c/0x74
      irq_thread+0x10c/0x1b0
      kthread+0xc8/0xd8
      ret_from_fork+0x10/0x20

This issue has not been identified earlier because tests were done on
a device with SMP disabled and so spinlocks were actually NOPs.

Now use spin_(un)lock_bh for TX queue related locking to avoid execution
of softirq work synchronously that would lead to a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228496">SUSE bug 1228496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41038</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers

Check that all fields of a V2 algorithm header fit into the available
firmware data buffer.

The wmfw V2 format introduced variable-length strings in the algorithm
block header. This means the overall header length is variable, and the
position of most fields varies depending on the length of the string
fields. Each field must be checked to ensure that it does not overflow
the firmware data buffer.

As this ia bugfix patch, the fixes avoid making any significant change to
the existing code. This makes it easier to review and less likely to
introduce new bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228509">SUSE bug 1228509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41039</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Fix overflow checking of wmfw header

Fix the checking that firmware file buffer is large enough for the
wmfw header, to prevent overrunning the buffer.

The original code tested that the firmware data buffer contained
enough bytes for the sums of the size of the structs

	wmfw_header + wmfw_adsp1_sizes + wmfw_footer

But wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and
Halo Core the equivalent struct is wmfw_adsp2_sizes, which is
4 bytes longer. So the length check didn't guarantee that there
are enough bytes in the firmware buffer for a header with
wmfw_adsp2_sizes.

This patch splits the length check into three separate parts. Each
of the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked
separately before they are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228515">SUSE bug 1228515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41040</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix UAF when resolving a clash

KASAN reports the following UAF:

 BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]
 Read of size 1 at addr ffff888c07603600 by task handler130/6469

 Call Trace:
  &lt;IRQ&gt;
  dump_stack_lvl+0x48/0x70
  print_address_description.constprop.0+0x33/0x3d0
  print_report+0xc0/0x2b0
  kasan_report+0xd0/0x120
  __asan_load1+0x6c/0x80
  tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]
  tcf_ct_act+0x886/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491
  __irq_exit_rcu+0x82/0xc0
  irq_exit_rcu+0xe/0x20
  common_interrupt+0xa1/0xb0
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_common_interrupt+0x27/0x40

 Allocated by task 6469:
  kasan_save_stack+0x38/0x70
  kasan_set_track+0x25/0x40
  kasan_save_alloc_info+0x1e/0x40
  __kasan_krealloc+0x133/0x190
  krealloc+0xaa/0x130
  nf_ct_ext_add+0xed/0x230 [nf_conntrack]
  tcf_ct_act+0x1095/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491

 Freed by task 6469:
  kasan_save_stack+0x38/0x70
  kasan_set_track+0x25/0x40
  kasan_save_free_info+0x2b/0x60
  ____kasan_slab_free+0x180/0x1f0
  __kasan_slab_free+0x12/0x30
  slab_free_freelist_hook+0xd2/0x1a0
  __kmem_cache_free+0x1a2/0x2f0
  kfree+0x78/0x120
  nf_conntrack_free+0x74/0x130 [nf_conntrack]
  nf_ct_destroy+0xb2/0x140 [nf_conntrack]
  __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]
  nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]
  __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]
  tcf_ct_act+0x12ad/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491

The ct may be dropped if a clash has been resolved but is still passed to
the tcf_ct_flow_table_process_conn function for further usage. This issue
can be fixed by retrieving ct from skb again after confirming conntrack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228518">SUSE bug 1228518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41041</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().

syzkaller triggered the warning [0] in udp_v4_early_demux().

In udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount
of the looked-up sk and use sock_pfree() as skb-&gt;destructor, so we check
SOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace
period.

Currently, SOCK_RCU_FREE is flagged for a bound socket after being put
into the hash table.  Moreover, the SOCK_RCU_FREE check is done too early
in udp_v[46]_early_demux() and sk_lookup(), so there could be a small race
window:

  CPU1                                 CPU2
  ----                                 ----
  udp_v4_early_demux()                 udp_lib_get_port()
  |                                    |- hlist_add_head_rcu()
  |- sk = __udp4_lib_demux_lookup()    |
  |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));
                                       `- sock_set_flag(sk, SOCK_RCU_FREE)

We had the same bug in TCP and fixed it in commit 871019b22d1b ("net:
set SOCK_RCU_FREE before inserting socket into hashtable").

Let's apply the same fix for UDP.

[0]:
WARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Modules linked in:
CPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Code: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe &lt;0f&gt; 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52
RSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c
RDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001
RBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680
R13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e
FS:  00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349
 ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624
 __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738
 netif_receive_skb_internal net/core/dev.c:5824 [inline]
 netif_receive_skb+0x271/0x300 net/core/dev.c:5884
 tun_rx_batched drivers/net/tun.c:1549 [inline]
 tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002
 tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0x76f/0x8d0 fs/read_write.c:590
 ksys_write+0xbf/0x190 fs/read_write.c:643
 __do_sys_write fs/read_write.c:655 [inline]
 __se_sys_write fs/read_write.c:652 [inline]
 __x64_sys_write+0x41/0x50 fs/read_write.c:652
 x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fc44a68bc1f
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48
RSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f
R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228520">SUSE bug 1228520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41042</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41042" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41042" ref_url="https://www.suse.com/security/cve/CVE-2024-41042" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: prefer nft_chain_validate

nft_chain_validate already performs loop detection because a cycle will
result in a call stack overflow (ctx-&gt;level &gt;= NFT_JUMP_STACK_SIZE).

It also follows maps via -&gt;validate callback in nft_lookup, so there
appears no reason to iterate the maps again.

nf_tables_check_loops() and all its helper functions can be removed.
This improves ruleset load time significantly, from 23s down to 12s.

This also fixes a crash bug. Old loop detection code can result in
unbounded recursion:

BUG: TASK stack guard page was hit at ....
Oops: stack guard page: 0000 [#1] PREEMPT SMP KASAN
CPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1
[..]

with a suitable ruleset during validation of register stores.

I can't see any actual reason to attempt to check for this from
nft_validate_register_store(), at this point the transaction is still in
progress, so we don't have a full picture of the rule graph.

For nf-next it might make sense to either remove it or make this depend
on table-&gt;validate_state in case we could catch an error earlier
(for improved error reporting to userspace).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41042/">CVE-2024-41042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41042">CVE-2024-41042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228526">SUSE bug 1228526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41044</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: reject claimed-as-LCP but actually malformed packets

Since 'ppp_async_encode()' assumes valid LCP packets (with code
from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that
LCP packet has an actual body beyond PPP_LCP header bytes, and
reject claimed-as-LCP but actually malformed data otherwise.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228530">SUSE bug 1228530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41045</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Defer work in bpf_timer_cancel_and_free

Currently, the same case as previous patch (two timer callbacks trying
to cancel each other) can be invoked through bpf_map_update_elem as
well, or more precisely, freeing map elements containing timers. Since
this relies on hrtimer_cancel as well, it is prone to the same deadlock
situation as the previous patch.

It would be sufficient to use hrtimer_try_to_cancel to fix this problem,
as the timer cannot be enqueued after async_cancel_and_free. Once
async_cancel_and_free has been done, the timer must be reinitialized
before it can be armed again. The callback running in parallel trying to
arm the timer will fail, and freeing bpf_hrtimer without waiting is
sufficient (given kfree_rcu), and bpf_timer_cb will return
HRTIMER_NORESTART, preventing the timer from being rearmed again.

However, there exists a UAF scenario where the callback arms the timer
before entering this function, such that if cancellation fails (due to
timer callback invoking this routine, or the target timer callback
running concurrently). In such a case, if the timer expiration is
significantly far in the future, the RCU grace period expiration
happening before it will free the bpf_hrtimer state and along with it
the struct hrtimer, that is enqueued.

Hence, it is clear cancellation needs to occur after
async_cancel_and_free, and yet it cannot be done inline due to deadlock
issues. We thus modify bpf_timer_cancel_and_free to defer work to the
global workqueue, adding a work_struct alongside rcu_head (both used at
_different_ points of time, so can share space).

Update existing code comments to reflect the new state of affairs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228531">SUSE bug 1228531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41048</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

skmsg: Skip zero length skb in sk_msg_recvmsg

When running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch
platform, the following kernel panic occurs:

  [...]
  Oops[#1]:
  CPU: 22 PID: 2824 Comm: test_progs Tainted: G           OE  6.10.0-rc2+ #18
  Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018
     ... ...
     ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560
    ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0
   CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
   PRMD: 0000000c (PPLV0 +PIE +PWE)
   EUEN: 00000007 (+FPE +SXE +ASXE -BTE)
   ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)
  ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
   BADV: 0000000000000040
   PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)
  Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack
  Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)
  Stack : ...
  Call Trace:
  [&lt;9000000004162774&gt;] copy_page_to_iter+0x74/0x1c0
  [&lt;90000000048bf6c0&gt;] sk_msg_recvmsg+0x120/0x560
  [&lt;90000000049f2b90&gt;] tcp_bpf_recvmsg_parser+0x170/0x4e0
  [&lt;90000000049aae34&gt;] inet_recvmsg+0x54/0x100
  [&lt;900000000481ad5c&gt;] sock_recvmsg+0x7c/0xe0
  [&lt;900000000481e1a8&gt;] __sys_recvfrom+0x108/0x1c0
  [&lt;900000000481e27c&gt;] sys_recvfrom+0x1c/0x40
  [&lt;9000000004c076ec&gt;] do_syscall+0x8c/0xc0
  [&lt;9000000003731da4&gt;] handle_syscall+0xc4/0x160
  Code: ...
  ---[ end trace 0000000000000000 ]---
  Kernel panic - not syncing: Fatal exception
  Kernel relocated by 0x3510000
   .text @ 0x9000000003710000
   .data @ 0x9000000004d70000
   .bss  @ 0x9000000006469400
  ---[ end Kernel panic - not syncing: Fatal exception ]---
  [...]

This crash happens every time when running sockmap_skb_verdict_shutdown
subtest in sockmap_basic.

This crash is because a NULL pointer is passed to page_address() in the
sk_msg_recvmsg(). Due to the different implementations depending on the
architecture, page_address(NULL) will trigger a panic on Loongarch
platform but not on x86 platform. So this bug was hidden on x86 platform
for a while, but now it is exposed on Loongarch platform. The root cause
is that a zero length skb (skb-&gt;len == 0) was put on the queue.

This zero length skb is a TCP FIN packet, which was sent by shutdown(),
invoked in test_sockmap_skb_verdict_shutdown():

	shutdown(p1, SHUT_WR);

In this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no
page is put to this sge (see sg_set_page in sg_set_page), but this empty
sge is queued into ingress_msg list.

And in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by
sg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it
to kmap_local_page() and to page_address(), then kernel panics.

To solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),
if copy is zero, that means it's a zero length skb, skip invoking
copy_page_to_iter(). We are using the EFAULT return triggered by
copy_page_to_iter to check for is_fin in tcp_bpf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228565">SUSE bug 1228565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41049</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filelock: fix potential use-after-free in posix_lock_inode

Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().
The request pointer had been changed earlier to point to a lock entry
that was added to the inode's list. However, before the tracepoint could
fire, another task raced in and freed that lock.

Fix this by moving the tracepoint inside the spinlock, which should
ensure that this doesn't happen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228486">SUSE bug 1228486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41056</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files

Use strnlen() instead of strlen() on the algorithm and coefficient name
string arrays in V1 wmfw files.

In V1 wmfw files the name is a NUL-terminated string in a fixed-size
array. cs_dsp should protect against overrunning the array if the NUL
terminator is missing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228480">SUSE bug 1228480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41057</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()

We got the following issue in our fault injection stress test:

==================================================================
BUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600
Read of size 8 at addr ffff888118efc000 by task kworker/u78:0/109

CPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 cachefiles_withdraw_cookie+0x4d9/0x600
 fscache_cookie_state_machine+0x5c8/0x1230
 fscache_cookie_worker+0x91/0x1c0
 process_one_work+0x7fa/0x1800
 [...]

Allocated by task 117:
 kmalloc_trace+0x1b3/0x3c0
 cachefiles_acquire_volume+0xf3/0x9c0
 fscache_create_volume_work+0x97/0x150
 process_one_work+0x7fa/0x1800
 [...]

Freed by task 120301:
 kfree+0xf1/0x2c0
 cachefiles_withdraw_cache+0x3fa/0x920
 cachefiles_put_unbind_pincount+0x1f6/0x250
 cachefiles_daemon_release+0x13b/0x290
 __fput+0x204/0xa00
 task_work_run+0x139/0x230
 do_exit+0x87a/0x29b0
 [...]
==================================================================

Following is the process that triggers the issue:

           p1                |             p2
------------------------------------------------------------
                              fscache_begin_lookup
                               fscache_begin_volume_access
                                fscache_cache_is_live(fscache_cache)
cachefiles_daemon_release
 cachefiles_put_unbind_pincount
  cachefiles_daemon_unbind
   cachefiles_withdraw_cache
    fscache_withdraw_cache
     fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN);
    cachefiles_withdraw_objects(cache)
    fscache_wait_for_objects(fscache)
      atomic_read(&amp;fscache_cache-&gt;object_count) == 0
                              fscache_perform_lookup
                               cachefiles_lookup_cookie
                                cachefiles_alloc_object
                                 refcount_set(&amp;object-&gt;ref, 1);
                                 object-&gt;volume = volume
                                 fscache_count_object(vcookie-&gt;cache);
                                  atomic_inc(&amp;fscache_cache-&gt;object_count)
    cachefiles_withdraw_volumes
     cachefiles_withdraw_volume
      fscache_withdraw_volume
      __cachefiles_free_volume
       kfree(cachefiles_volume)
                              fscache_cookie_state_machine
                               cachefiles_withdraw_cookie
                                cache = object-&gt;volume-&gt;cache;
                                // cachefiles_volume UAF !!!

After setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups
to complete first, and then wait for fscache_cache-&gt;object_count == 0 to
avoid the cookie exiting after the volume has been freed and triggering
the above issue. Therefore call fscache_withdraw_volume() before calling
cachefiles_withdraw_objects().

This way, after setting FSCACHE_CACHE_IS_WITHDRAWN, only the following two
cases will occur:
1) fscache_begin_lookup fails in fscache_begin_volume_access().
2) fscache_withdraw_volume() will ensure that fscache_count_object() has
   been executed before calling fscache_wait_for_objects().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228462">SUSE bug 1228462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229275">SUSE bug 1229275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41058</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix slab-use-after-free in fscache_withdraw_volume()

We got the following issue in our fault injection stress test:

==================================================================
BUG: KASAN: slab-use-after-free in fscache_withdraw_volume+0x2e1/0x370
Read of size 4 at addr ffff88810680be08 by task ondemand-04-dae/5798

CPU: 0 PID: 5798 Comm: ondemand-04-dae Not tainted 6.8.0-dirty #565
Call Trace:
 kasan_check_range+0xf6/0x1b0
 fscache_withdraw_volume+0x2e1/0x370
 cachefiles_withdraw_volume+0x31/0x50
 cachefiles_withdraw_cache+0x3ad/0x900
 cachefiles_put_unbind_pincount+0x1f6/0x250
 cachefiles_daemon_release+0x13b/0x290
 __fput+0x204/0xa00
 task_work_run+0x139/0x230

Allocated by task 5820:
 __kmalloc+0x1df/0x4b0
 fscache_alloc_volume+0x70/0x600
 __fscache_acquire_volume+0x1c/0x610
 erofs_fscache_register_volume+0x96/0x1a0
 erofs_fscache_register_fs+0x49a/0x690
 erofs_fc_fill_super+0x6c0/0xcc0
 vfs_get_super+0xa9/0x140
 vfs_get_tree+0x8e/0x300
 do_new_mount+0x28c/0x580
 [...]

Freed by task 5820:
 kfree+0xf1/0x2c0
 fscache_put_volume.part.0+0x5cb/0x9e0
 erofs_fscache_unregister_fs+0x157/0x1b0
 erofs_kill_sb+0xd9/0x1c0
 deactivate_locked_super+0xa3/0x100
 vfs_get_super+0x105/0x140
 vfs_get_tree+0x8e/0x300
 do_new_mount+0x28c/0x580
 [...]
==================================================================

Following is the process that triggers the issue:

        mount failed         |         daemon exit
------------------------------------------------------------
 deactivate_locked_super        cachefiles_daemon_release
  erofs_kill_sb
   erofs_fscache_unregister_fs
    fscache_relinquish_volume
     __fscache_relinquish_volume
      fscache_put_volume(fscache_volume, fscache_volume_put_relinquish)
       zero = __refcount_dec_and_test(&amp;fscache_volume-&gt;ref, &amp;ref);
                                 cachefiles_put_unbind_pincount
                                  cachefiles_daemon_unbind
                                   cachefiles_withdraw_cache
                                    cachefiles_withdraw_volumes
                                     list_del_init(&amp;volume-&gt;cache_link)
       fscache_free_volume(fscache_volume)
        cache-&gt;ops-&gt;free_volume
         cachefiles_free_volume
          list_del_init(&amp;cachefiles_volume-&gt;cache_link);
        kfree(fscache_volume)
                                     cachefiles_withdraw_volume
                                      fscache_withdraw_volume
                                       fscache_volume-&gt;n_accesses
                                       // fscache_volume UAF !!!

The fscache_volume in cache-&gt;volumes must not have been freed yet, but its
reference count may be 0. So use the new fscache_try_get_volume() helper
function try to get its reference count.

If the reference count of fscache_volume is 0, fscache_put_volume() is
freeing it, so wait for it to be removed from cache-&gt;volumes.

If its reference count is not 0, call cachefiles_withdraw_volume() with
reference count protection to avoid the above issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228459">SUSE bug 1228459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41059</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix uninit-value in copy_name

[syzbot reported]
BUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160
 sized_strscpy+0xc4/0x160
 copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411
 hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750
 vfs_listxattr fs/xattr.c:493 [inline]
 listxattr+0x1f3/0x6b0 fs/xattr.c:840
 path_listxattr fs/xattr.c:864 [inline]
 __do_sys_listxattr fs/xattr.c:876 [inline]
 __se_sys_listxattr fs/xattr.c:873 [inline]
 __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873
 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3877 [inline]
 slab_alloc_node mm/slub.c:3918 [inline]
 kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065
 kmalloc include/linux/slab.h:628 [inline]
 hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699
 vfs_listxattr fs/xattr.c:493 [inline]
 listxattr+0x1f3/0x6b0 fs/xattr.c:840
 path_listxattr fs/xattr.c:864 [inline]
 __do_sys_listxattr fs/xattr.c:876 [inline]
 __se_sys_listxattr fs/xattr.c:873 [inline]
 __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873
 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
[Fix]
When allocating memory to strbuf, initialize memory to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228573">SUSE bug 1228573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41060</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: check bo_va-&gt;bo is non-NULL before using it

The call to radeon_vm_clear_freed might clear bo_va-&gt;bo, so
we have to check it before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228567">SUSE bug 1228567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41062</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bluetooth/l2cap: sync sock recv cb and release

The problem occurs between the system call to close the sock and hci_rx_work,
where the former releases the sock and the latter accesses it without lock protection.

           CPU0                       CPU1
           ----                       ----
           sock_close                 hci_rx_work
	   l2cap_sock_release         hci_acldata_packet
	   l2cap_sock_kill            l2cap_recv_frame
	   sk_free                    l2cap_conless_channel
	                              l2cap_sock_recv_cb

If hci_rx_work processes the data that needs to be received before the sock is
closed, then everything is normal; Otherwise, the work thread may access the
released sock when receiving data.

Add a chan mutex in the rx callback of the sock to achieve synchronization between
the sock release and recv cb.

Sock is dead, so set chan data to NULL, avoid others use invalid sock pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228578">SUSE bug 1228578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41063</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: cancel all works upon hci_unregister_dev()

syzbot is reporting that calling hci_release_dev() from hci_error_reset()
due to hci_dev_put() from hci_error_reset() can cause deadlock at
destroy_workqueue(), for hci_error_reset() is called from
hdev-&gt;req_workqueue which destroy_workqueue() needs to flush.

We need to make sure that hdev-&gt;{rx_work,cmd_work,tx_work} which are
queued into hdev-&gt;workqueue and hdev-&gt;{power_on,error_reset} which are
queued into hdev-&gt;req_workqueue are no longer running by the moment

       destroy_workqueue(hdev-&gt;workqueue);
       destroy_workqueue(hdev-&gt;req_workqueue);

are called from hci_release_dev().

Call cancel_work_sync() on these work items from hci_unregister_dev()
as soon as hdev-&gt;list is removed from hci_dev_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228580">SUSE bug 1228580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41064</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/eeh: avoid possible crash when edev-&gt;pdev changes

If a PCI device is removed during eeh_pe_report_edev(), edev-&gt;pdev
will change and can cause a crash, hold the PCI rescan/remove lock
while taking a copy of edev-&gt;pdev-&gt;bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228599">SUSE bug 1228599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41065</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Whitelist dtl slub object for copying to userspace

Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*
results in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as
shown below.

    kernel BUG at mm/usercopy.c:102!
    Oops: Exception in kernel mode, sig: 5 [#1]
    LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
    Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc
    scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse
    CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85
    Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries
    NIP:  c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8
    REGS: c000000120c078c0 TRAP: 0700   Not tainted  (6.10.0-rc3)
    MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 2828220f  XER: 0000000e
    CFAR: c0000000001fdc80 IRQMASK: 0
    [ ... GPRs omitted ... ]
    NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0
    LR [c0000000005d23d0] usercopy_abort+0x74/0xb0
    Call Trace:
     usercopy_abort+0x74/0xb0 (unreliable)
     __check_heap_object+0xf8/0x120
     check_heap_object+0x218/0x240
     __check_object_size+0x84/0x1a4
     dtl_file_read+0x17c/0x2c4
     full_proxy_read+0x8c/0x110
     vfs_read+0xdc/0x3a0
     ksys_read+0x84/0x144
     system_call_exception+0x124/0x330
     system_call_vectored_common+0x15c/0x2ec
    --- interrupt: 3000 at 0x7fff81f3ab34

Commit 6d07d1cd300f ("usercopy: Restrict non-usercopy caches to size 0")
requires that only whitelisted areas in slab/slub objects can be copied to
userspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.
Dtl contains hypervisor dispatch events which are expected to be read by
privileged users. Hence mark this safe for user access.
Specify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the
entire object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228636">SUSE bug 1228636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41066</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: Add tx check to prevent skb leak

Below is a summary of how the driver stores a reference to an skb during
transmit:
    tx_buff[free_map[consumer_index]]-&gt;skb = new_skb;
    free_map[consumer_index] = IBMVNIC_INVALID_MAP;
    consumer_index ++;
Where variable data looks like this:
    free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]
                                               	consumer_index^
    tx_buff == [skb=null, skb=&lt;ptr&gt;, skb=&lt;ptr&gt;, skb=null, skb=null]

The driver has checks to ensure that free_map[consumer_index] pointed to
a valid index but there was no check to ensure that this index pointed
to an unused/null skb address. So, if, by some chance, our free_map and
tx_buff lists become out of sync then we were previously risking an
skb memory leak. This could then cause tcp congestion control to stop
sending packets, eventually leading to ETIMEDOUT.

Therefore, add a conditional to ensure that the skb address is null. If
not then warn the user (because this is still a bug that should be
patched) and free the old pointer to prevent memleak/tcp problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228640">SUSE bug 1228640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41068</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Fix sclp_init() cleanup on failure

If sclp_init() fails it only partially cleans up: if there are multiple
failing calls to sclp_init() sclp_state_change_event will be added several
times to sclp_reg_list, which results in the following warning:

------------[ cut here ]------------
list_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10.
WARNING: CPU: 0 PID: 1 at lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3
Krnl PSW : 0404c00180000000 000003ffe0d6076a (__list_add_valid_or_report+0xe2/0xf8)
           R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
...
Call Trace:
 [&lt;000003ffe0d6076a&gt;] __list_add_valid_or_report+0xe2/0xf8
([&lt;000003ffe0d60766&gt;] __list_add_valid_or_report+0xde/0xf8)
 [&lt;000003ffe0a8d37e&gt;] sclp_init+0x40e/0x450
 [&lt;000003ffe00009f2&gt;] do_one_initcall+0x42/0x1e0
 [&lt;000003ffe15b77a6&gt;] do_initcalls+0x126/0x150
 [&lt;000003ffe15b7a0a&gt;] kernel_init_freeable+0x1ba/0x1f8
 [&lt;000003ffe0d6650e&gt;] kernel_init+0x2e/0x180
 [&lt;000003ffe000301c&gt;] __ret_from_fork+0x3c/0x60
 [&lt;000003ffe0d759ca&gt;] ret_from_fork+0xa/0x30

Fix this by removing sclp_state_change_event from sclp_reg_list when
sclp_init() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228579">SUSE bug 1228579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41069</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: topology: Fix references to freed memory

Most users after parsing a topology file, release memory used by it, so
having pointer references directly into topology file contents is wrong.
Use devm_kmemdup(), to allocate memory as needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228645">SUSE bug 1228645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41070</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()

Al reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().

It looks up `stt` from tablefd, but then continues to use it after doing
fdput() on the returned fd. After the fdput() the tablefd is free to be
closed by another thread. The close calls kvm_spapr_tce_release() and
then release_spapr_tce_table() (via call_rcu()) which frees `stt`.

Although there are calls to rcu_read_lock() in
kvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent
the UAF, because `stt` is used outside the locked regions.

With an artifcial delay after the fdput() and a userspace program which
triggers the race, KASAN detects the UAF:

  BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]
  Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505
  CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1
  Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV
  Call Trace:
    dump_stack_lvl+0xb4/0x108 (unreliable)
    print_report+0x2b4/0x6ec
    kasan_report+0x118/0x2b0
    __asan_load4+0xb8/0xd0
    kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]
    kvm_vfio_set_attr+0x524/0xac0 [kvm]
    kvm_device_ioctl+0x144/0x240 [kvm]
    sys_ioctl+0x62c/0x1810
    system_call_exception+0x190/0x440
    system_call_vectored_common+0x15c/0x2ec
  ...
  Freed by task 0:
   ...
   kfree+0xec/0x3e0
   release_spapr_tce_table+0xd4/0x11c [kvm]
   rcu_core+0x568/0x16a0
   handle_softirqs+0x23c/0x920
   do_softirq_own_stack+0x6c/0x90
   do_softirq_own_stack+0x58/0x90
   __irq_exit_rcu+0x218/0x2d0
   irq_exit+0x30/0x80
   arch_local_irq_restore+0x128/0x230
   arch_local_irq_enable+0x1c/0x30
   cpuidle_enter_state+0x134/0x5cc
   cpuidle_enter+0x6c/0xb0
   call_cpuidle+0x7c/0x100
   do_idle+0x394/0x410
   cpu_startup_entry+0x60/0x70
   start_secondary+0x3fc/0x410
   start_secondary_prolog+0x10/0x14

Fix it by delaying the fdput() until `stt` is no longer in use, which
is effectively the entire function. To keep the patch minimal add a call
to fdput() at each of the existing return paths. Future work can convert
the function to goto or __cleanup style cleanup.

With the fix in place the test case no longer triggers the UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228581">SUSE bug 1228581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41071</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Avoid address calculations via out of bounds array indexing

req-&gt;n_channels must be set before req-&gt;channels[] can be used.

This patch fixes one of the issues encountered in [1].

[   83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4
[   83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]'
[...]
[   83.964264] Call Trace:
[   83.964267]  &lt;TASK&gt;
[   83.964269]  dump_stack_lvl+0x3f/0xc0
[   83.964274]  __ubsan_handle_out_of_bounds+0xec/0x110
[   83.964278]  ieee80211_prep_hw_scan+0x2db/0x4b0
[   83.964281]  __ieee80211_start_scan+0x601/0x990
[   83.964291]  nl80211_trigger_scan+0x874/0x980
[   83.964295]  genl_family_rcv_msg_doit+0xe8/0x160
[   83.964298]  genl_rcv_msg+0x240/0x270
[...]

[1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41072</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: wext: add extra SIOCSIWSCAN data check

In 'cfg80211_wext_siwscan()', add extra check whether number of
channels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed
IW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228626">SUSE bug 1228626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41073</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: avoid double free special payload

If a discard request needs to be retried, and that retry may fail before
a new special payload is added, a double free will result. Clear the
RQF_SPECIAL_LOAD when the request is cleaned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228635">SUSE bug 1228635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41076</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix memory leak in nfs4_set_security_label

We leak nfs_fattr and nfs4_label every time we set a security xattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228649">SUSE bug 1228649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix quota root leak after quota disable failure

If during the quota disable we fail when cleaning the quota tree or when
deleting the root from the root tree, we jump to the 'out' label without
ever dropping the reference on the quota root, resulting in a leak of the
root since fs_info-&gt;quota_root is no longer pointing to the root (we have
set it to NULL just before those steps).

Fix this by always doing a btrfs_put_root() call under the 'out' label.
This is a problem that exists since qgroups were first added in 2012 by
commit bed92eae26cc ("Btrfs: qgroup implementation and prototypes"), but
back then we missed a kfree on the quota root and free_extent_buffer()
calls on its root and commit root nodes, since back then roots were not
yet reference counted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228655">SUSE bug 1228655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: always initialize cqe.result

The spec doesn't mandate that the first two double words (aka results)
for the command queue entry need to be set to 0 when they are not
used (not specified). Though, the target implemention returns 0 for TCP
and FC but not for RDMA.

Let's make RDMA behave the same and thus explicitly initializing the
result field. This prevents leaking any data from the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228615">SUSE bug 1228615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41080</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix possible deadlock in io_register_iowq_max_workers()

The io_register_iowq_max_workers() function calls io_put_sq_data(),
which acquires the sqd-&gt;lock without releasing the uring_lock.
Similar to the commit 009ad9f0c6ee ("io_uring: drop ctx-&gt;uring_lock
before acquiring sqd-&gt;lock"), this can lead to a potential deadlock
situation.

To resolve this issue, the uring_lock is released before calling
io_put_sq_data(), and then it is re-acquired after the function call.

This change ensures that the locks are acquired in the correct
order, preventing the possibility of a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228616">SUSE bug 1228616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41081</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ila: block BH in ila_output()

As explained in commit 1378817486d6 ("tipc: block BH
before using dst_cache"), net/core/dst_cache.c
helpers need to be called with BH disabled.

ila_output() is called from lwtunnel_output()
possibly from process context, and under rcu_read_lock().

We might be interrupted by a softirq, re-enter ila_output()
and corrupt dst_cache data structures.

Fix the race by using local_bh_disable().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228617">SUSE bug 1228617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41082</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fabrics: use reserved tag for reg read/write command

In some scenarios, if too many commands are issued by nvme command in
the same time by user tasks, this may exhaust all tags of admin_q. If
a reset (nvme reset or IO timeout) occurs before these commands finish,
reconnect routine may fail to update nvme regs due to insufficient tags,
which will cause kernel hang forever. In order to workaround this issue,
maybe we can let reg_read32()/reg_read64()/reg_write32() use reserved
tags. This maybe safe for nvmf:

1. For the disable ctrl path,  we will not issue connect command
2. For the enable ctrl / fw activate path, since connect and reg_xx()
   are called serially.

So the reserved tags may still be enough while reg_xx() use reserved tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228620">SUSE bug 1228620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41087</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: libata-core: Fix double free on error

If e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump
to the err_out label, which will call devres_release_group().
devres_release_group() will trigger a call to ata_host_release().
ata_host_release() calls kfree(host), so executing the kfree(host) in
ata_host_alloc() will lead to a double free:

kernel BUG at mm/slub.c:553!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 11 PID: 599 Comm: (udev-worker) Not tainted 6.10.0-rc5 #47
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:kfree+0x2cf/0x2f0
Code: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da
RSP: 0018:ffffc90000f377f0 EFLAGS: 00010246
RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320
RDX: 000000000000400b RSI: ffffffffc02c9de5 RDI: ffff888112b1f2c0
RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000
R10: ffffc90000f37610 R11: 617461203a736b6e R12: ffffea00044ac780
R13: ffff888100046400 R14: ffffffffc02c9de5 R15: 0000000000000006
FS:  00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body.cold+0x19/0x27
 ? die+0x2e/0x50
 ? do_trap+0xca/0x110
 ? do_error_trap+0x6a/0x90
 ? kfree+0x2cf/0x2f0
 ? exc_invalid_op+0x50/0x70
 ? kfree+0x2cf/0x2f0
 ? asm_exc_invalid_op+0x1a/0x20
 ? ata_host_alloc+0xf5/0x120 [libata]
 ? ata_host_alloc+0xf5/0x120 [libata]
 ? kfree+0x2cf/0x2f0
 ata_host_alloc+0xf5/0x120 [libata]
 ata_host_alloc_pinfo+0x14/0xa0 [libata]
 ahci_init_one+0x6c9/0xd20 [ahci]

Ensure that we will not call kfree(host) twice, by performing the kfree()
only if the devres_open_group() call failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228740">SUSE bug 1228740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41088</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcp251xfd: fix infinite loop when xmit fails

When the mcp251xfd_start_xmit() function fails, the driver stops
processing messages, and the interrupt routine does not return,
running indefinitely even after killing the running application.

Error messages:
[  441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16
[  441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3).
... and repeat forever.

The issue can be triggered when multiple devices share the same SPI
interface. And there is concurrent access to the bus.

The problem occurs because tx_ring-&gt;head increments even if
mcp251xfd_start_xmit() fails. Consequently, the driver skips one TX
package while still expecting a response in
mcp251xfd_handle_tefif_one().

Resolve the issue by starting a workqueue to write the tx obj
synchronously if err = -EBUSY. In case of another error, decrement
tx_ring-&gt;head, remove skb from the echo stack, and drop the message.

[mkl: use more imperative wording in patch description]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228469">SUSE bug 1228469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41089</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes

In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().
Add a check to avoid null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228658">SUSE bug 1228658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tap: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tap_get_user_xdp() path, which could cause a corrupted skb to be
sent downstack. Even before the skb is transmitted, the
tap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more
than ETH_HLEN. Once transmitted, this could either cause out-of-bound
access beyond the actual length, or confuse the underlayer with incorrect
or inconsistent header length in the skb metadata.

In the alternative path, tap_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted.

This is to drop any frame shorter than the Ethernet header size just like
how tap_get_user() does.

CVE: CVE-2024-41090
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228714">SUSE bug 1228714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41091</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tun_xdp_one() path, which could cause a corrupted skb to be sent
downstack. Even before the skb is transmitted, the
tun_xdp_one--&gt;eth_type_trans() may access the Ethernet header although it
can be less than ETH_HLEN. Once transmitted, this could either cause
out-of-bound access beyond the actual length, or confuse the underlayer
with incorrect or inconsistent header length in the skb metadata.

In the alternative path, tun_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted for
IFF_TAP.

This is to drop any frame shorter than the Ethernet header size just like
how tun_get_user() does.

CVE: CVE-2024-41091
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228327">SUSE bug 1228327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41092</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Fix potential UAF by revoke of fence registers

CI has been sporadically reporting the following issue triggered by
igt@i915_selftest@live@hangcheck on ADL-P and similar machines:

&lt;6&gt; [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence
...
&lt;6&gt; [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled
&lt;6&gt; [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled
&lt;3&gt; [414.070354] Unable to pin Y-tiled fence; err:-4
&lt;3&gt; [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&amp;fence-&gt;active))
...
&lt;4&gt;[  609.603992] ------------[ cut here ]------------
&lt;2&gt;[  609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301!
&lt;4&gt;[  609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt;[  609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G     U  W          6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1
&lt;4&gt;[  609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023
&lt;4&gt;[  609.604010] Workqueue: i915 __i915_gem_free_work [i915]
&lt;4&gt;[  609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915]
...
&lt;4&gt;[  609.604271] Call Trace:
&lt;4&gt;[  609.604273]  &lt;TASK&gt;
...
&lt;4&gt;[  609.604716]  __i915_vma_evict+0x2e9/0x550 [i915]
&lt;4&gt;[  609.604852]  __i915_vma_unbind+0x7c/0x160 [i915]
&lt;4&gt;[  609.604977]  force_unbind+0x24/0xa0 [i915]
&lt;4&gt;[  609.605098]  i915_vma_destroy+0x2f/0xa0 [i915]
&lt;4&gt;[  609.605210]  __i915_gem_object_pages_fini+0x51/0x2f0 [i915]
&lt;4&gt;[  609.605330]  __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915]
&lt;4&gt;[  609.605440]  process_scheduled_works+0x351/0x690
...

In the past, there were similar failures reported by CI from other IGT
tests, observed on other platforms.

Before commit 63baf4f3d587 ("drm/i915/gt: Only wait for GPU activity
before unbinding a GGTT fence"), i915_vma_revoke_fence() was waiting for
idleness of vma-&gt;active via fence_update().   That commit introduced
vma-&gt;fence-&gt;active in order for the fence_update() to be able to wait
selectively on that one instead of vma-&gt;active since only idleness of
fence registers was needed.  But then, another commit 0d86ee35097a
("drm/i915/gt: Make fence revocation unequivocal") replaced the call to
fence_update() in i915_vma_revoke_fence() with only fence_write(), and
also added that GEM_BUG_ON(!i915_active_is_idle(&amp;fence-&gt;active)) in front.
No justification was provided on why we might then expect idleness of
vma-&gt;fence-&gt;active without first waiting on it.

The issue can be potentially caused by a race among revocation of fence
registers on one side and sequential execution of signal callbacks invoked
on completion of a request that was using them on the other, still
processed in parallel to revocation of those fence registers.  Fix it by
waiting for idleness of vma-&gt;fence-&gt;active in i915_vma_revoke_fence().

(cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41093</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: avoid using null object of framebuffer

Instead of using state-&gt;fb-&gt;obj[0] directly, get object from framebuffer
by calling drm_gem_fb_get_obj() and return error code when object is
null to avoid using null object of framebuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228660">SUSE bug 1228660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes

In nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228662">SUSE bug 1228662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41097</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: atm: cxacru: fix endpoint checking in cxacru_bind()

Syzbot is still reporting quite an old issue [1] that occurs due to
incomplete checking of present usb endpoints. As such, wrong
endpoints types may be used at urb sumbitting stage which in turn
triggers a warning in usb_submit_urb().

Fix the issue by verifying that required endpoint types are present
for both in and out endpoints, taking into account cmd endpoint type.

Unfortunately, this patch has not been tested on real hardware.

[1] Syzbot report:
usb 1-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
Modules linked in:
CPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: usb_hub_wq hub_event
RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
...
Call Trace:
 cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649
 cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760
 cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209
 usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055
 cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363
 usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:517 [inline]
 really_probe+0x23c/0xcd0 drivers/base/dd.c:595
 __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777
 __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894
 bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427
 __device_attach+0x228/0x4a0 drivers/base/dd.c:965
 bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487
 device_add+0xc2f/0x2180 drivers/base/core.c:3354
 usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170
 usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238
 usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228513">SUSE bug 1228513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41098</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: libata-core: Fix null pointer dereference on error

If the ata_port_alloc() call in ata_host_alloc() fails,
ata_host_release() will get called.

However, the code in ata_host_release() tries to free ata_port struct
members unconditionally, which can lead to the following:

BUG: unable to handle page fault for address: 0000000000003990
PGD 0 P4D 0
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:ata_host_release.cold+0x2f/0x6e [libata]
Code: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41
RSP: 0018:ffffc90000ebb968 EFLAGS: 00010246
RAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0
RBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68
R10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004
R13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006
FS:  00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body.cold+0x19/0x27
 ? page_fault_oops+0x15a/0x2f0
 ? exc_page_fault+0x7e/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? ata_host_release.cold+0x2f/0x6e [libata]
 ? ata_host_release.cold+0x2f/0x6e [libata]
 release_nodes+0x35/0xb0
 devres_release_group+0x113/0x140
 ata_host_alloc+0xed/0x120 [libata]
 ata_host_alloc_pinfo+0x14/0xa0 [libata]
 ahci_init_one+0x6c9/0xd20 [ahci]

Do not access ata_port struct members unconditionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228467">SUSE bug 1228467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41110</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:4391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2801-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020191.html" source="SUSE-SU"/>
		<reference ref_id="TID000021573" ref_url="https://www.suse.com/support/kb/doc/?id=000021573" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14446-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IY5X4DAH24CGCGTMMLFUPNY6HNUSGO4/" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low.

Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it.

A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 in January 2019, the fix was not carried forward to later major versions, resulting in a regression. Anyone who depends on authorization plugins that introspect the request and/or response body to make access control decisions is potentially impacted.

Docker EE v19.03.x and all versions of Mirantis Container Runtime are not vulnerable.

docker-ce v27.1.1 containes patches to fix the vulnerability. Patches have also been merged into the master, 19.03, 20.0, 23.0, 24.0, 25.0, 26.0, and 26.1 release branches. If one is unable to upgrade immediately, avoid using AuthZ plugins and/or restrict access to the Docker API to trusted parties, following the principle of least privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2025-01-24"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228324">SUSE bug 1228324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958498" comment="docker-26.1.5_ce-150000.212.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41184</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037276.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1, an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228123">SUSE bug 1228123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009947440" comment="keepalived-2.2.2-150500.8.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009242242" comment="keepalived is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42069</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix possible double free in error handling path

When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function adev_release
calls kfree(madev). We shouldn't call kfree(madev) again
in the error handling path. Set 'madev' to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228463">SUSE bug 1228463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42070</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers

register store validation for NFT_DATA_VALUE is conditional, however,
the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This
only requires a new helper function to infer the register type from the
set datatype so this conditional check can be removed. Otherwise,
pointer to chain object can be leaked through the registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228470">SUSE bug 1228470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42074</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: acp: add a null check for chip_pdev structure

When acp platform device creation is skipped, chip-&gt;chip_pdev value will
remain NULL. Add NULL check for chip-&gt;chip_pdev structure in
snd_acp_resume() function to avoid null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228481">SUSE bug 1228481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42076</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: can: j1939: Initialize unused data in j1939_send_one()

syzbot reported kernel-infoleak in raw_recvmsg() [1]. j1939_send_one()
creates full frame including unused data, but it doesn't initialize
it. This causes the kernel-infoleak issue. Fix this by initializing
unused data.

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 copy_to_user_iter lib/iov_iter.c:24 [inline]
 iterate_ubuf include/linux/iov_iter.h:29 [inline]
 iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 iterate_and_advance include/linux/iov_iter.h:271 [inline]
 _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
 copy_to_iter include/linux/uio.h:196 [inline]
 memcpy_to_msg include/linux/skbuff.h:4113 [inline]
 raw_recvmsg+0x2b8/0x9e0 net/can/raw.c:1008
 sock_recvmsg_nosec net/socket.c:1046 [inline]
 sock_recvmsg+0x2c4/0x340 net/socket.c:1068
 ____sys_recvmsg+0x18a/0x620 net/socket.c:2803
 ___sys_recvmsg+0x223/0x840 net/socket.c:2845
 do_recvmmsg+0x4fc/0xfd0 net/socket.c:2939
 __sys_recvmmsg net/socket.c:3018 [inline]
 __do_sys_recvmmsg net/socket.c:3041 [inline]
 __se_sys_recvmmsg net/socket.c:3034 [inline]
 __x64_sys_recvmmsg+0x397/0x490 net/socket.c:3034
 x64_sys_call+0xf6c/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:300
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3804 [inline]
 slab_alloc_node mm/slub.c:3845 [inline]
 kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
 __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
 alloc_skb include/linux/skbuff.h:1313 [inline]
 alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
 sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
 sock_alloc_send_skb include/net/sock.h:1842 [inline]
 j1939_sk_alloc_skb net/can/j1939/socket.c:878 [inline]
 j1939_sk_send_loop net/can/j1939/socket.c:1142 [inline]
 j1939_sk_sendmsg+0xc0a/0x2730 net/can/j1939/socket.c:1277
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x30f/0x380 net/socket.c:745
 ____sys_sendmsg+0x877/0xb60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674
 x64_sys_call+0xc4b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Bytes 12-15 of 16 are uninitialized
Memory access of size 16 starts at ffff888120969690
Data copied to user address 00000000200017c0

CPU: 1 PID: 5050 Comm: syz-executor198 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228484">SUSE bug 1228484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42077</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix DIO failure due to insufficient transaction credits

The code in ocfs2_dio_end_io_write() estimates number of necessary
transaction credits using ocfs2_calc_extend_credits().  This however does
not take into account that the IO could be arbitrarily large and can
contain arbitrary number of extents.

Extent tree manipulations do often extend the current transaction but not
in all of the cases.  For example if we have only single block extents in
the tree, ocfs2_mark_extent_written() will end up calling
ocfs2_replace_extent_rec() all the time and we will never extend the
current transaction and eventually exhaust all the transaction credits if
the IO contains many single block extents.  Once that happens a
WARN_ON(jbd2_handle_buffer_credits(handle) &lt;= 0) is triggered in
jbd2_journal_dirty_metadata() and subsequently OCFS2 aborts in response to
this error.  This was actually triggered by one of our customers on a
heavily fragmented OCFS2 filesystem.

To fix the issue make sure the transaction always has enough credits for
one extent insert before each call of ocfs2_mark_extent_written().

Heming Zhao said:

------
PANIC: "Kernel panic - not syncing: OCFS2: (device dm-1): panic forced after error"

PID: xxx  TASK: xxxx  CPU: 5  COMMAND: "SubmitThread-CA"
  #0 machine_kexec at ffffffff8c069932
  #1 __crash_kexec at ffffffff8c1338fa
  #2 panic at ffffffff8c1d69b9
  #3 ocfs2_handle_error at ffffffffc0c86c0c [ocfs2]
  #4 __ocfs2_abort at ffffffffc0c88387 [ocfs2]
  #5 ocfs2_journal_dirty at ffffffffc0c51e98 [ocfs2]
  #6 ocfs2_split_extent at ffffffffc0c27ea3 [ocfs2]
  #7 ocfs2_change_extent_flag at ffffffffc0c28053 [ocfs2]
  #8 ocfs2_mark_extent_written at ffffffffc0c28347 [ocfs2]
  #9 ocfs2_dio_end_io_write at ffffffffc0c2bef9 [ocfs2]
#10 ocfs2_dio_end_io at ffffffffc0c2c0f5 [ocfs2]
#11 dio_complete at ffffffff8c2b9fa7
#12 do_blockdev_direct_IO at ffffffff8c2bc09f
#13 ocfs2_direct_IO at ffffffffc0c2b653 [ocfs2]
#14 generic_file_direct_write at ffffffff8c1dcf14
#15 __generic_file_write_iter at ffffffff8c1dd07b
#16 ocfs2_file_write_iter at ffffffffc0c49f1f [ocfs2]
#17 aio_write at ffffffff8c2cc72e
#18 kmem_cache_alloc at ffffffff8c248dde
#19 do_io_submit at ffffffff8c2ccada
#20 do_syscall_64 at ffffffff8c004984
#21 entry_SYSCALL_64_after_hwframe at ffffffff8c8000ba
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix NULL pointer dereference in gfs2_log_flush

In gfs2_jindex_free(), set sdp-&gt;sd_jdesc to NULL under the log flush
lock to provide exclusion against gfs2_log_flush().

In gfs2_log_flush(), check if sdp-&gt;sd_jdesc is non-NULL before
dereferencing it.  Otherwise, we could run into a NULL pointer
dereference when outstanding glock work races with an unmount
(glock_work_func -&gt; run_queue -&gt; do_xmote -&gt; inode_go_sync -&gt;
gfs2_log_flush).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228672">SUSE bug 1228672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42080</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/restrack: Fix potential invalid address access

struct rdma_restrack_entry's kern_name was set to KBUILD_MODNAME
in ib_create_cq(), while if the module exited but forgot del this
rdma_restrack_entry, it would cause a invalid address access in
rdma_restrack_clean() when print the owner of this rdma_restrack_entry.

These code is used to help find one forgotten PD release in one of the
ULPs. But it is not needed anymore, so delete them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228673">SUSE bug 1228673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42082</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: Remove WARN() from __xdp_reg_mem_model()

syzkaller reports a warning in __xdp_reg_mem_model().

The warning occurs only if __mem_id_init_hash_table() returns an error. It
returns the error in two cases:

  1. memory allocation fails;
  2. rhashtable_init() fails when some fields of rhashtable_params
     struct are not initialized properly.

The second case cannot happen since there is a static const rhashtable_params
struct with valid fields. So, warning is only triggered when there is a
problem with memory allocation.

Thus, there is no sense in using WARN() to handle this error and it can be
safely removed.

WARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299

CPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299

Call Trace:
 xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344
 xdp_test_run_setup net/bpf/test_run.c:188 [inline]
 bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377
 bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267
 bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240
 __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649
 __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Found by Linux Verification Center (linuxtesting.org) with syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228482">SUSE bug 1228482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock

When config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system
to enter suspend status with below command:
echo mem &gt; /sys/power/state
There will be a deadlock issue occurring. Detailed invoking path as
below:
dwc3_suspend_common()
    spin_lock_irqsave(&amp;dwc-&gt;lock, flags);              &lt;-- 1st
    dwc3_gadget_suspend(dwc);
        dwc3_gadget_soft_disconnect(dwc);
            spin_lock_irqsave(&amp;dwc-&gt;lock, flags);      &lt;-- 2nd
This issue is exposed by commit c7ebd8149ee5 ("usb: dwc3: gadget: Fix
NULL pointer dereference in dwc3_gadget_suspend") that removes the code
of checking whether dwc-&gt;gadget_driver is NULL or not. It causes the
following code is executed and deadlock occurs when trying to get the
spinlock. In fact, the root cause is the commit 5265397f9442("usb: dwc3:
Remove DWC3 locking during gadget suspend/resume") that forgot to remove
the lock of otg mode. So, remove the redundant lock of otg mode during
gadget suspend/resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228456">SUSE bug 1228456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42086</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: chemical: bme680: Fix overflows in compensate() functions

There are cases in the compensate functions of the driver that
there could be overflows of variables due to bit shifting ops.
These implications were initially discussed here [1] and they
were mentioned in log message of Commit 1b3bd8592780 ("iio:
chemical: Add support for Bosch BME680 sensor").

[1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228452">SUSE bug 1228452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42087</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep

The ilitek-ili9881c controls the reset GPIO using the non-sleeping
gpiod_set_value() function. This complains loudly when the GPIO
controller needs to sleep. As the caller can sleep, use
gpiod_set_value_cansleep() to fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228677">SUSE bug 1228677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42089</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: fsl-asoc-card: set priv-&gt;pdev before using it

priv-&gt;pdev pointer was set after being used in
fsl_asoc_card_audmux_init().
Move this assignment at the start of the probe function, so
sub-functions can correctly use pdev through priv.

fsl_asoc_card_audmux_init() dereferences priv-&gt;pdev to get access to the
dev struct, used with dev_err macros.
As priv is zero-initialised, there would be a NULL pointer dereference.
Note that if priv-&gt;dev is dereferenced before assignment but never used,
for example if there is no error to be printed, the driver won't crash
probably due to compiler optimisations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228450">SUSE bug 1228450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42090</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER

In create_pinctrl(), pinctrl_maps_mutex is acquired before calling
add_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()
calls pinctrl_free(). However, pinctrl_free() attempts to acquire
pinctrl_maps_mutex, which is already held by create_pinctrl(), leading to
a potential deadlock.

This patch resolves the issue by releasing pinctrl_maps_mutex before
calling pinctrl_free(), preventing the deadlock.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228449">SUSE bug 1228449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42092</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: davinci: Validate the obtained number of IRQs

Value of pdata-&gt;gpio_unbanked is taken from Device Tree. In case of broken
DT due to any error this value can be any. Without this value validation
there can be out of chips-&gt;irqs array boundaries access in
davinci_gpio_probe().

Validate the obtained nirq value so that it won't exceed the maximum
number of IRQs per bank.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228447">SUSE bug 1228447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42093</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/dpaa2: Avoid explicit cpumask var allocation on stack

For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.

Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250_omap: Implementation of Errata i2310

As per Errata i2310[0], Erroneous timeout can be triggered,
if this Erroneous interrupt is not cleared then it may leads
to storm of interrupts, therefore apply Errata i2310 solution.

[0] https://www.ti.com/lit/pdf/sprz536 page 23
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228446">SUSE bug 1228446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42096</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86: stop playing stack games in profile_pc()

The 'profile_pc()' function is used for timer-based profiling, which
isn't really all that relevant any more to begin with, but it also ends
up making assumptions based on the stack layout that aren't necessarily
valid.

Basically, the code tries to account the time spent in spinlocks to the
caller rather than the spinlock, and while I support that as a concept,
it's not worth the code complexity or the KASAN warnings when no serious
profiling is done using timers anyway these days.

And the code really does depend on stack layout that is only true in the
simplest of cases.  We've lost the comment at some point (I think when
the 32-bit and 64-bit code was unified), but it used to say:

	Assume the lock function has either no stack frame or a copy
	of eflags from PUSHF.

which explains why it just blindly loads a word or two straight off the
stack pointer and then takes a minimal look at the values to just check
if they might be eflags or the return pc:

	Eflags always has bits 22 and up cleared unlike kernel addresses

but that basic stack layout assumption assumes that there isn't any lock
debugging etc going on that would complicate the code and cause a stack
frame.

It causes KASAN unhappiness reported for years by syzkaller [1] and
others [2].

With no real practical reason for this any more, just remove the code.

Just for historical interest, here's some background commits relating to
this code from 2006:

  0cb91a229364 ("i386: Account spinlocks to the caller during profiling for !FP kernels")
  31679f38d886 ("Simplify profile_pc on x86-64")

and a code unification from 2009:

  ef4512882dbe ("x86: time_32/64.c unify profile_pc")

but the basics of this thing actually goes back to before the git tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228633">SUSE bug 1228633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42097</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: emux: improve patch ioctl data validation

In load_data(), make the validation of and skipping over the main info
block match that in load_guspatch().

In load_guspatch(), add checking that the specified patch length matches
the actually supplied data, like load_data() already did.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228766">SUSE bug 1228766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42098</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ecdh - explicitly zeroize private_key

private_key is overwritten with the key parameter passed in by the
caller (if present), or alternatively a newly generated private key.
However, it is possible that the caller provides a key (or the newly
generated key) which is shorter than the previous key. In that
scenario, some key material from the previous key would not be
overwritten. The easiest solution is to explicitly zeroize the entire
private_key array first.

Note that this patch slightly changes the behavior of this function:
previously, if the ecc_gen_privkey failed, the old private_key would
remain. Now, the private_key is always zeroized. This behavior is
consistent with the case where params.key is set and ecc_is_key_valid
fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42101</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes

In nouveau_connector_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a possible NULL pointer
dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228495">SUSE bug 1228495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42104</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: add missing check for inode numbers on directory entries

Syzbot reported that mounting and unmounting a specific pattern of
corrupted nilfs2 filesystem images causes a use-after-free of metadata
file inodes, which triggers a kernel bug in lru_add_fn().

As Jan Kara pointed out, this is because the link count of a metadata file
gets corrupted to 0, and nilfs_evict_inode(), which is called from iput(),
tries to delete that inode (ifile inode in this case).

The inconsistency occurs because directories containing the inode numbers
of these metadata files that should not be visible in the namespace are
read without checking.

Fix this issue by treating the inode numbers of these internal files as
errors in the sanity check helper when reading directory folios/pages.

Also thanks to Hillf Danton and Matthew Wilcox for their initial mm-layer
analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228654">SUSE bug 1228654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42105</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix inode number range checks

Patch series "nilfs2: fix potential issues related to reserved inodes".

This series fixes one use-after-free issue reported by syzbot, caused by
nilfs2's internal inode being exposed in the namespace on a corrupted
filesystem, and a couple of flaws that cause problems if the starting
number of non-reserved inodes written in the on-disk super block is
intentionally (or corruptly) changed from its default value.  


This patch (of 3):

In the current implementation of nilfs2, "nilfs-&gt;ns_first_ino", which
gives the first non-reserved inode number, is read from the superblock,
but its lower limit is not checked.

As a result, if a number that overlaps with the inode number range of
reserved inodes such as the root directory or metadata files is set in the
super block parameter, the inode number test macros (NILFS_MDT_INODE and
NILFS_VALID_INODE) will not function properly.

In addition, these test macros use left bit-shift calculations using with
the inode number as the shift count via the BIT macro, but the result of a
shift calculation that exceeds the bit width of an integer is undefined in
the C specification, so if "ns_first_ino" is set to a large value other
than the default value NILFS_USER_INO (=11), the macros may potentially
malfunction depending on the environment.

Fix these issues by checking the lower bound of "nilfs-&gt;ns_first_ino" and
by preventing bit shifts equal to or greater than the NILFS_USER_INO
constant in the inode number test macros.

Also, change the type of "ns_first_ino" from signed integer to unsigned
integer to avoid the need for type casting in comparisons such as the
lower bound check introduced this time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228665">SUSE bug 1228665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42106</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet_diag: Initialize pad field in struct inet_diag_req_v2

KMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw
sockets uses the pad field in struct inet_diag_req_v2 for the
underlying protocol. This field corresponds to the sdiag_raw_protocol
field in struct inet_diag_req_raw.

inet_diag_get_exact_compat() converts inet_diag_req to
inet_diag_req_v2, but leaves the pad field uninitialized. So the issue
occurs when raw_lookup() accesses the sdiag_raw_protocol field.

Fix this by initializing the pad field in
inet_diag_get_exact_compat(). Also, do the same fix in
inet_diag_dump_compat() to avoid the similar issue in the future.

[1]
BUG: KMSAN: uninit-value in raw_lookup net/ipv4/raw_diag.c:49 [inline]
BUG: KMSAN: uninit-value in raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71
 raw_lookup net/ipv4/raw_diag.c:49 [inline]
 raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71
 raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99
 inet_diag_cmd_exact+0x7d9/0x980
 inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]
 inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426
 sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282
 netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564
 sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297
 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
 netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361
 netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x332/0x3d0 net/socket.c:745
 ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639
 __sys_sendmsg net/socket.c:2668 [inline]
 __do_sys_sendmsg net/socket.c:2677 [inline]
 __se_sys_sendmsg net/socket.c:2675 [inline]
 __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675
 x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was stored to memory at:
 raw_sock_get+0x650/0x800 net/ipv4/raw_diag.c:71
 raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99
 inet_diag_cmd_exact+0x7d9/0x980
 inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]
 inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426
 sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282
 netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564
 sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297
 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
 netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361
 netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x332/0x3d0 net/socket.c:745
 ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639
 __sys_sendmsg net/socket.c:2668 [inline]
 __do_sys_sendmsg net/socket.c:2677 [inline]
 __se_sys_sendmsg net/socket.c:2675 [inline]
 __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675
 x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable req.i created at:
 inet_diag_get_exact_compat net/ipv4/inet_diag.c:1396 [inline]
 inet_diag_rcv_msg_compat+0x2a6/0x530 net/ipv4/inet_diag.c:1426
 sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282

CPU: 1 PID: 8888 Comm: syz-executor.6 Not tainted 6.10.0-rc4-00217-g35bb670d65fc #32
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228493">SUSE bug 1228493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42107</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42107" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Don't process extts if PTP is disabled

The ice_ptp_extts_event() function can race with ice_ptp_release() and
result in a NULL pointer dereference which leads to a kernel panic.

Panic occurs because the ice_ptp_extts_event() function calls
ptp_clock_event() with a NULL pointer. The ice driver has already
released the PTP clock by the time the interrupt for the next external
timestamp event occurs.

To fix this, modify the ice_ptp_extts_event() function to check the
PTP state and bail early if PTP is not ready.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228494">SUSE bug 1228494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42110</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()

The following is emitted when using idxd (DSA) dmanegine as the data
mover for ntb_transport that ntb_netdev uses.

[74412.546922] BUG: using smp_processor_id() in preemptible [00000000] code: irq/52-idxd-por/14526
[74412.556784] caller is netif_rx_internal+0x42/0x130
[74412.562282] CPU: 6 PID: 14526 Comm: irq/52-idxd-por Not tainted 6.9.5 #5
[74412.569870] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.E9I.1752.P05.2402080856 02/08/2024
[74412.581699] Call Trace:
[74412.584514]  &lt;TASK&gt;
[74412.586933]  dump_stack_lvl+0x55/0x70
[74412.591129]  check_preemption_disabled+0xc8/0xf0
[74412.596374]  netif_rx_internal+0x42/0x130
[74412.600957]  __netif_rx+0x20/0xd0
[74412.604743]  ntb_netdev_rx_handler+0x66/0x150 [ntb_netdev]
[74412.610985]  ntb_complete_rxc+0xed/0x140 [ntb_transport]
[74412.617010]  ntb_rx_copy_callback+0x53/0x80 [ntb_transport]
[74412.623332]  idxd_dma_complete_txd+0xe3/0x160 [idxd]
[74412.628963]  idxd_wq_thread+0x1a6/0x2b0 [idxd]
[74412.634046]  irq_thread_fn+0x21/0x60
[74412.638134]  ? irq_thread+0xa8/0x290
[74412.642218]  irq_thread+0x1a0/0x290
[74412.646212]  ? __pfx_irq_thread_fn+0x10/0x10
[74412.651071]  ? __pfx_irq_thread_dtor+0x10/0x10
[74412.656117]  ? __pfx_irq_thread+0x10/0x10
[74412.660686]  kthread+0x100/0x130
[74412.664384]  ? __pfx_kthread+0x10/0x10
[74412.668639]  ret_from_fork+0x31/0x50
[74412.672716]  ? __pfx_kthread+0x10/0x10
[74412.676978]  ret_from_fork_asm+0x1a/0x30
[74412.681457]  &lt;/TASK&gt;

The cause is due to the idxd driver interrupt completion handler uses
threaded interrupt and the threaded handler is not hard or soft interrupt
context. However __netif_rx() can only be called from interrupt context.
Change the call to netif_rx() in order to allow completion via normal
context for dmaengine drivers that utilize threaded irq handling.

While the following commit changed from netif_rx() to __netif_rx(),
baebdf48c360 ("net: dev: Makes sure netif_rx() can be invoked in any context."),
the change should've been a noop instead. However, the code precedes this
fix should've been using netif_rx_ni() or netif_rx_any_context().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228501">SUSE bug 1228501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42114</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values

syzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM
to 2^31.

We had a similar issue in sch_fq, fixed with commit
d9e15a273306 ("pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM")

watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24]
Modules linked in:
irq event stamp: 131135
 hardirqs last  enabled at (131134): [&lt;ffff80008ae8778c&gt;] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
 hardirqs last  enabled at (131134): [&lt;ffff80008ae8778c&gt;] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95
 hardirqs last disabled at (131135): [&lt;ffff80008ae85378&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
 hardirqs last disabled at (131135): [&lt;ffff80008ae85378&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
 softirqs last  enabled at (125892): [&lt;ffff80008907e82c&gt;] neigh_hh_init net/core/neighbour.c:1538 [inline]
 softirqs last  enabled at (125892): [&lt;ffff80008907e82c&gt;] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553
 softirqs last disabled at (125896): [&lt;ffff80008904166c&gt;] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
CPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: mld mld_ifc_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __list_del include/linux/list.h:195 [inline]
 pc : __list_del_entry include/linux/list.h:218 [inline]
 pc : list_move_tail include/linux/list.h:310 [inline]
 pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
 pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
 lr : __list_del_entry include/linux/list.h:218 [inline]
 lr : list_move_tail include/linux/list.h:310 [inline]
 lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
 lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854
sp : ffff800093d36700
x29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000
x26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0
x23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0
x20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0
x17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8
x14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff
x11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc
x2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470
Call trace:
  __list_del include/linux/list.h:195 [inline]
  __list_del_entry include/linux/list.h:218 [inline]
  list_move_tail include/linux/list.h:310 [inline]
  fq_tin_dequeue include/net/fq_impl.h:112 [inline]
  ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
  wake_tx_push_queue net/mac80211/util.c:294 [inline]
  ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315
  drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline]
  schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline]
  ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664
  ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966
  ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062
  __ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338
  ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532
  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
  netdev_start_xmit include/linux/netdevice.h:4917 [inline]
  xmit_one net/core/dev.c:3531 [inline]
  dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547
  __dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341
  dev_queue_xmit include/linux/netdevice.h:3091 [inline]
  neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563
  neigh_output include/net/neighbour.h:542 [inline]
  ip6_fini
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228564">SUSE bug 1228564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42115</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jffs2: Fix potential illegal address access in jffs2_free_inode

During the stress testing of the jffs2 file system,the following
abnormal printouts were found:
[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948
[ 2430.649622] Mem abort info:
[ 2430.649829]   ESR = 0x96000004
[ 2430.650115]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 2430.650564]   SET = 0, FnV = 0
[ 2430.650795]   EA = 0, S1PTW = 0
[ 2430.651032]   FSC = 0x04: level 0 translation fault
[ 2430.651446] Data abort info:
[ 2430.651683]   ISV = 0, ISS = 0x00000004
[ 2430.652001]   CM = 0, WnR = 0
[ 2430.652558] [0069696969696948] address between user and kernel address ranges
[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33
[ 2430.655008] Hardware name: linux,dummy-virt (DT)
[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 2430.656142] pc : kfree+0x78/0x348
[ 2430.656630] lr : jffs2_free_inode+0x24/0x48
[ 2430.657051] sp : ffff800009eebd10
[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000
[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000
[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14
[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000
[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000
[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19
[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14
[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302
[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342
[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000
[ 2430.664217] Call trace:
[ 2430.664528]  kfree+0x78/0x348
[ 2430.664855]  jffs2_free_inode+0x24/0x48
[ 2430.665233]  i_callback+0x24/0x50
[ 2430.665528]  rcu_do_batch+0x1ac/0x448
[ 2430.665892]  rcu_core+0x28c/0x3c8
[ 2430.666151]  rcu_core_si+0x18/0x28
[ 2430.666473]  __do_softirq+0x138/0x3cc
[ 2430.666781]  irq_exit+0xf0/0x110
[ 2430.667065]  handle_domain_irq+0x6c/0x98
[ 2430.667447]  gic_handle_irq+0xac/0xe8
[ 2430.667739]  call_on_irq_stack+0x28/0x54
The parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of
the jffs_inode_info structure. It was found that all variables in the jffs_inode_info
structure were 5a5a5a5a, except for the first member sem. It is suspected that these
variables are not initialized because they were set to 5a5a5a5a during memory testing,
which is meant to detect uninitialized memory.The sem variable is initialized in the
function jffs2_i_init_once, while other members are initialized in
the function jffs2_init_inode_info.

The function jffs2_init_inode_info is called after iget_locked,
but in the iget_locked function, the destroy_inode process is triggered,
which releases the inode and consequently, the target member of the inode
is not initialized.In concurrent high pressure scenarios, iget_locked
may enter the destroy_inode branch as described in the code.

Since the destroy_inode functionality of jffs2 only releases the target,
the fix method is to set target to NULL in jffs2_i_init_once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228656">SUSE bug 1228656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42119</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip finding free audio for unknown engine_id

[WHY]
ENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it
also means it is uninitialized and does not need free audio.

[HOW]
Skip and return NULL.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228584">SUSE bug 1228584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42120</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check pipe offset before setting vblank

pipe_ctx has a size of MAX_PIPES so checking its index before accessing
the array.

This fixes an OVERRUN issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228588">SUSE bug 1228588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42121</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check index msg_id before read or write

[WHAT]
msg_id is used as an array index and it cannot be a negative value, and
therefore cannot be equal to MOD_HDCP_MESSAGE_ID_INVALID (-1).

[HOW]
Check whether msg_id is valid before reading and setting.

This fixes 4 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228590">SUSE bug 1228590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42122</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL pointer check for kzalloc

[Why &amp; How]
Check return pointer of kzalloc before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228591">SUSE bug 1228591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42124</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Make qedf_execute_tmf() non-preemptible

Stop calling smp_processor_id() from preemptible code in
qedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.

[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646
[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228705">SUSE bug 1228705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42126</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.

nmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel
crash when invoked during real mode interrupt handling (e.g. early HMI/MCE
interrupt handler) if percpu allocation comes from vmalloc area.

Early HMI/MCE handlers are called through DEFINE_INTERRUPT_HANDLER_NMI()
wrapper which invokes nmi_enter/nmi_exit calls. We don't see any issue when
percpu allocation is from the embedded first chunk. However with
CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK enabled there are chances where percpu
allocation can come from the vmalloc area.

With kernel command line "percpu_alloc=page" we can force percpu allocation
to come from vmalloc area and can see kernel crash in machine_check_early:

[    1.215714] NIP [c000000000e49eb4] rcu_nmi_enter+0x24/0x110
[    1.215717] LR [c0000000000461a0] machine_check_early+0xf0/0x2c0
[    1.215719] --- interrupt: 200
[    1.215720] [c000000fffd73180] [0000000000000000] 0x0 (unreliable)
[    1.215722] [c000000fffd731b0] [0000000000000000] 0x0
[    1.215724] [c000000fffd73210] [c000000000008364] machine_check_early_common+0x134/0x1f8

Fix this by avoiding use of nmi_enter()/nmi_exit() in real mode if percpu
first chunk is not embedded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42127</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/lima: fix shared irq handling on driver remove

lima uses a shared interrupt, so the interrupt handlers must be prepared
to be called at any time. At driver removal time, the clocks are
disabled early and the interrupts stay registered until the very end of
the remove process due to the devm usage.
This is potentially a bug as the interrupts access device registers
which assumes clocks are enabled. A crash can be triggered by removing
the driver in a kernel with CONFIG_DEBUG_SHIRQ enabled.
This patch frees the interrupts at each lima device finishing callback
so that the handlers are already unregistered by the time we fully
disable clocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228721">SUSE bug 1228721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42130</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc/nci: Add the inconsistency check between the input data length and count

write$nci(r0, &amp;(0x7f0000000740)=ANY=[@ANYBLOB="610501"], 0xf)

Syzbot constructed a write() call with a data length of 3 bytes but a count value
of 15, which passed too little data to meet the basic requirements of the function
nci_rf_intf_activated_ntf_packet().

Therefore, increasing the comparison between data length and count value to avoid
problems caused by inconsistent data length and count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228687">SUSE bug 1228687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42131</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: avoid overflows in dirty throttling logic

The dirty throttling logic is interspersed with assumptions that dirty
limits in PAGE_SIZE units fit into 32-bit (so that various multiplications
fit into 64-bits).  If limits end up being larger, we will hit overflows,
possible divisions by 0 etc.  Fix these problems by never allowing so
large dirty limits as they have dubious practical value anyway.  For
dirty_bytes / dirty_background_bytes interfaces we can just refuse to set
so large limits.  For dirty_ratio / dirty_background_ratio it isn't so
simple as the dirty limit is computed from the amount of available memory
which can change due to memory hotplug etc.  So when converting dirty
limits from ratios to numbers of pages, we just don't allow the result to
exceed UINT_MAX.

This is root-only triggerable problem which occurs when the operator
sets dirty limits to &gt;16 TB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228650">SUSE bug 1228650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42137</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot

Commit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed
serdev") will cause below regression issue:

BT can't be enabled after below steps:
cold boot -&gt; enable BT -&gt; disable BT -&gt; warm reboot -&gt; BT enable failure
if property enable-gpios is not configured within DT|ACPI for QCA6390.

The commit is to fix a use-after-free issue within qca_serdev_shutdown()
by adding condition to avoid the serdev is flushed or wrote after closed
but also introduces this regression issue regarding above steps since the
VSC is not sent to reset controller during warm reboot.

Fixed by sending the VSC to reset controller within qca_serdev_shutdown()
once BT was ever enabled, and the use-after-free issue is also fixed by
this change since the serdev is still opened before it is flushed or wrote.

Verified by the reported machine Dell XPS 13 9310 laptop over below two
kernel commits:
commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump
implementation for QCA") of bluetooth-next tree.
commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump
implementation for QCA") of linus mainline tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228563">SUSE bug 1228563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42139</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42139" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix improper extts handling

Extts events are disabled and enabled by the application ts2phc.
However, in case where the driver is removed when the application is
running, a specific extts event remains enabled and can cause a kernel
crash.
As a side effect, when the driver is reloaded and application is started
again, remaining extts event for the channel from a previous run will
keep firing and the message "extts on unexpected channel" might be
printed to the user.

To avoid that, extts events shall be disabled when PTP is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228503">SUSE bug 1228503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42142</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: E-switch, Create ingress ACL when needed

Currently, ingress acl is used for three features. It is created only
when vport metadata match and prio tag are enabled. But active-backup
lag mode also uses it. It is independent of vport metadata match and
prio tag. And vport metadata match can be disabled using the
following devlink command:

 # devlink dev param set pci/0000:08:00.0 name esw_port_metadata \
	value false cmode runtime

If ingress acl is not created, will hit panic when creating drop rule
for active-backup lag mode. If always create it, there will be about
5% performance degradation.

Fix it by creating ingress acl when needed. If esw_port_metadata is
true, ingress acl exists, then create drop rule using existing
ingress acl. If esw_port_metadata is false, create ingress acl and
then create drop rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228491">SUSE bug 1228491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42143</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42143" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42143" ref_url="https://www.suse.com/security/cve/CVE-2024-42143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42143/">CVE-2024-42143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228748">SUSE bug 1228748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42145</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Implement a limit on UMAD receive List

The existing behavior of ib_umad, which maintains received MAD
packets in an unbounded list, poses a risk of uncontrolled growth.
As user-space applications extract packets from this list, the rate
of extraction may not match the rate of incoming packets, leading
to potential list overflow.

To address this, we introduce a limit to the size of the list. After
considering typical scenarios, such as OpenSM processing, which can
handle approximately 100k packets per second, and the 1-second retry
timeout for most packets, we set the list size limit to 200k. Packets
received beyond this limit are dropped, assuming they are likely timed
out by the time they are handled by user-space.

Notably, packets queued on the receive list due to reasons like
timed-out sends are preserved even when the list is full.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228744">SUSE bug 1228744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42148</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnx2x: Fix multiple UBSAN array-index-out-of-bounds

Fix UBSAN warnings that occur when using a system with 32 physical
cpu cores or more, or when the user defines a number of Ethernet
queues greater than or equal to FP_SB_MAX_E1x using the num_queues
module parameter.

Currently there is a read/write out of bounds that occurs on the array
"struct stats_query_entry query" present inside the "bnx2x_fw_stats_req"
struct in "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h".
Looking at the definition of the "struct stats_query_entry query" array:

struct stats_query_entry query[FP_SB_MAX_E1x+
         BNX2X_FIRST_QUEUE_QUERY_IDX];

FP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and
has a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3
meaning the array has a total size of 19.
Since accesses to "struct stats_query_entry query" are offset-ted by
BNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet
queues should not exceed FP_SB_MAX_E1x (16). However one of these queues
is reserved for FCOE and thus the number of Ethernet queues should be set
to [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if
it is not.

This is also described in a comment in the source code in
drivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition
of FP_SB_MAX_E1x. Below is the part of this explanation that it important
for this patch

/*
  * The total number of L2 queues, MSIX vectors and HW contexts (CIDs) is
  * control by the number of fast-path status blocks supported by the
  * device (HW/FW). Each fast-path status block (FP-SB) aka non-default
  * status block represents an independent interrupts context that can
  * serve a regular L2 networking queue. However special L2 queues such
  * as the FCoE queue do not require a FP-SB and other components like
  * the CNIC may consume FP-SB reducing the number of possible L2 queues
  *
  * If the maximum number of FP-SB available is X then:
  * a. If CNIC is supported it consumes 1 FP-SB thus the max number of
  *    regular L2 queues is Y=X-1
  * b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)
  * c. If the FCoE L2 queue is supported the actual number of L2 queues
  *    is Y+1
  * d. The number of irqs (MSIX vectors) is either Y+1 (one extra for
  *    slow-path interrupts) or Y+2 if CNIC is supported (one additional
  *    FP interrupt context for the CNIC).
  * e. The number of HW context (CID count) is always X or X+1 if FCoE
  *    L2 queue is supported. The cid for the FCoE L2 queue is always X.
  */

However this driver also supports NICs that use the E2 controller which can
handle more queues due to having more FP-SB represented by FP_SB_MAX_E2.
Looking at the commits when the E2 support was added, it was originally
using the E1x parameters: commit f2e0899f0f27 ("bnx2x: Add 57712 support").
Back then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver
was later updated to take full advantage of the E2 instead of having it be
limited to the capabilities of the E1x. But as far as we can tell, the
array "stats_query_entry query" was still limited to using the FP-SB
available to the E1x cards as part of an oversignt when the driver was
updated to take full advantage of the E2, and now with the driver being
aware of the greater queue size supported by E2 NICs, it causes the UBSAN
warnings seen in the stack traces below.

This patch increases the size of the "stats_query_entry query" array by
replacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle
both types of NICs.

Stack traces:

UBSAN: array-index-out-of-bounds in
       drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11
index 20 is out of range for type 'stats_query_entry [19]'
CPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic
	     #202405052133
Hardware name: HP ProLiant DL360 Gen9/ProLiant DL360 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228487">SUSE bug 1228487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42152</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a possible leak when destroy a ctrl during qp establishment

In nvmet_sq_destroy we capture sq-&gt;ctrl early and if it is non-NULL we
know that a ctrl was allocated (in the admin connect request handler)
and we need to release pending AERs, clear ctrl-&gt;sqs and sq-&gt;ctrl
(for nvme-loop primarily), and drop the final reference on the ctrl.

However, a small window is possible where nvmet_sq_destroy starts (as
a result of the client giving up and disconnecting) concurrently with
the nvme admin connect cmd (which may be in an early stage). But *before*
kill_and_confirm of sq-&gt;ref (i.e. the admin connect managed to get an sq
live reference). In this case, sq-&gt;ctrl was allocated however after it was
captured in a local variable in nvmet_sq_destroy.
This prevented the final reference drop on the ctrl.

Solve this by re-capturing the sq-&gt;ctrl after all inflight request has
completed, where for sure sq-&gt;ctrl reference is final, and move forward
based on that.

This issue was observed in an environment with many hosts connecting
multiple ctrls simoutanuosly, creating a delay in allocating a ctrl
leading up to this race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228724">SUSE bug 1228724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_metrics: validate source addr length

I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4
is at least 4 bytes long, and the policy doesn't have an entry
for this attribute at all (neither does it for IPv6 but v6 is
manually validated).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228507">SUSE bug 1228507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42155</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42155" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Wipe copies of protected- and secure-keys

Although the clear-key of neither protected- nor secure-keys is
accessible, this key material should only be visible to the calling
process. So wipe all copies of protected- or secure-keys from stack,
even in case of an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228733">SUSE bug 1228733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42156</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Wipe copies of clear-key structures on failure

Wipe all sensitive data from stack for all IOCTLs, which convert a
clear-key into a protected- or secure-key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228722">SUSE bug 1228722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42157</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Wipe sensitive data on failure

Wipe sensitive data from stack also if the copy_to_user() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228727">SUSE bug 1228727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42158</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42158" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings

Replace memzero_explicit() and kfree() with kfree_sensitive() to fix
warnings reported by Coccinelle:

WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1506)
WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1643)
WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1770)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228720">SUSE bug 1228720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42161</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD

[Changes from V1:
 - Use a default branch in the switch statement to initialize `val'.]

GCC warns that `val' may be used uninitialized in the
BPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as:

	[...]
	unsigned long long val;						      \
	[...]								      \
	switch (__CORE_RELO(s, field, BYTE_SIZE)) {			      \
	case 1: val = *(const unsigned char *)p; break;			      \
	case 2: val = *(const unsigned short *)p; break;		      \
	case 4: val = *(const unsigned int *)p; break;			      \
	case 8: val = *(const unsigned long long *)p; break;		      \
        }       							      \
	[...]
	val;								      \
	}								      \

This patch adds a default entry in the switch statement that sets
`val' to zero in order to avoid the warning, and random values to be
used in case __builtin_preserve_field_info returns unexpected values
for BPF_FIELD_BYTE_SIZE.

Tested in bpf-next master.
No regressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228756">SUSE bug 1228756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42162</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42162" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: Account for stopped queues when reading NIC stats

We now account for the fact that the NIC might send us stats for a
subset of queues. Without this change, gve_get_ethtool_stats might make
an invalid access on the priv-&gt;stats_report-&gt;stats array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228706">SUSE bug 1228706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42223</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: tda10048: Fix integer overflow

state-&gt;xtal_hz can be up to 16M, so it can overflow a 32 bit integer
when multiplied by pll_mfactor.

Create a new 64 bit variable to hold the calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228726">SUSE bug 1228726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42224</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: Correct check for empty list

Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO
busses") mv88e6xxx_default_mdio_bus() has checked that the
return value of list_first_entry() is non-NULL.

This appears to be intended to guard against the list chip-&gt;mdios being
empty.  However, it is not the correct check as the implementation of
list_first_entry is not designed to return NULL for empty lists.

Instead, use list_first_entry_or_null() which does return NULL if the
list is empty.

Flagged by Smatch.
Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228723">SUSE bug 1228723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880171" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009880170" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42225</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: replace skb_put with skb_put_zero

Avoid potentially reusing uninitialized data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228710">SUSE bug 1228710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42226</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228709">SUSE bug 1228709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42228</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019753.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc

Initialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.
V2: To really improve the handling we would actually
   need to have a separate value of 0xffffffff.(Christian)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228667">SUSE bug 1228667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42229</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: aead,cipher - zeroize key buffer after use

I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding
cryptographic information should be zeroized once they are no longer
needed. Accomplish this by using kfree_sensitive for buffers that
previously held the private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42230</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Fix scv instruction crash with kexec

kexec on pseries disables AIL (reloc_on_exc), required for scv
instruction support, before other CPUs have been shut down. This means
they can execute scv instructions after AIL is disabled, which causes an
interrupt at an unexpected entry location that crashes the kernel.

Change the kexec sequence to disable AIL after other CPUs have been
brought down.

As a refresher, the real-mode scv interrupt vector is 0x17000, and the
fixed-location head code probably couldn't easily deal with implementing
such high addresses so it was just decided not to support that interrupt
at all.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228489">SUSE bug 1228489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix race between delayed_work() and ceph_monc_stop()

The way the delayed work is handled in ceph_monc_stop() is prone to
races with mon_fault() and possibly also finish_hunting().  Both of
these can requeue the delayed work which wouldn't be canceled by any of
the following code in case that happens after cancel_delayed_work_sync()
runs -- __close_session() doesn't mess with the delayed work in order
to avoid interfering with the hunting interval logic.  This part was
missed in commit b5d91704f53e ("libceph: behave in mon_fault() if
cur_mon &lt; 0") and use-after-free can still ensue on monc and objects
that hang off of it, with monc-&gt;auth and monc-&gt;monmap being
particularly susceptible to quickly being reused.

To fix this:

- clear monc-&gt;cur_mon and monc-&gt;hunting as part of closing the session
  in ceph_monc_stop()
- bail from delayed_work() if monc-&gt;cur_mon is cleared, similar to how
  it's done in mon_fault() and finish_hunting() (based on monc-&gt;hunting)
- call cancel_delayed_work_sync() after the session is closed
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229458">SUSE bug 1229458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42236</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()

Userspace provided string 's' could trivially have the length zero. Left
unchecked this will firstly result in an OOB read in the form
`if (str[0 - 1] == '\n') followed closely by an OOB write in the form
`str[0 - 1] = '\0'`.

There is already a validating check to catch strings that are too long.
Let's supply an additional check for invalid strings that are too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228964">SUSE bug 1228964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42237</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Validate payload length before processing block

Move the payload length check in cs_dsp_load() and cs_dsp_coeff_load()
to be done before the block is processed.

The check that the length of a block payload does not exceed the number
of remaining bytes in the firwmware file buffer was being done near the
end of the loop iteration. However, some code before that check used the
length field without validating it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228992">SUSE bug 1228992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42238</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42238" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Return error if block header overflows file

Return an error from cs_dsp_power_up() if a block header is longer
than the amount of data left in the file.

The previous code in cs_dsp_load() and cs_dsp_load_coeff() would loop
while there was enough data left in the file for a valid region. This
protected against overrunning the end of the file data, but it didn't
abort the file processing with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228991">SUSE bug 1228991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42239</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42239" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fail bpf_timer_cancel when callback is being cancelled

Given a schedule:

timer1 cb			timer2 cb

bpf_timer_cancel(timer2);	bpf_timer_cancel(timer1);

Both bpf_timer_cancel calls would wait for the other callback to finish
executing, introducing a lockup.

Add an atomic_t count named 'cancelling' in bpf_hrtimer. This keeps
track of all in-flight cancellation requests for a given BPF timer.
Whenever cancelling a BPF timer, we must check if we have outstanding
cancellation requests, and if so, we must fail the operation with an
error (-EDEADLK) since cancellation is synchronous and waits for the
callback to finish executing. This implies that we can enter a deadlock
situation involving two or more timer callbacks executing in parallel
and attempting to cancel one another.

Note that we avoid incrementing the cancelling counter for the target
timer (the one being cancelled) if bpf_timer_cancel is not invoked from
a callback, to avoid spurious errors. The whole point of detecting
cur-&gt;cancelling and returning -EDEADLK is to not enter a busy wait loop
(which may or may not lead to a lockup). This does not apply in case the
caller is in a non-callback context, the other side can continue to
cancel as it sees fit without running into errors.

Background on prior attempts:

Earlier versions of this patch used a bool 'cancelling' bit and used the
following pattern under timer-&gt;lock to publish cancellation status.

lock(t-&gt;lock);
t-&gt;cancelling = true;
mb();
if (cur-&gt;cancelling)
	return -EDEADLK;
unlock(t-&gt;lock);
hrtimer_cancel(t-&gt;timer);
t-&gt;cancelling = false;

The store outside the critical section could overwrite a parallel
requests t-&gt;cancelling assignment to true, to ensure the parallely
executing callback observes its cancellation status.

It would be necessary to clear this cancelling bit once hrtimer_cancel
is done, but lack of serialization introduced races. Another option was
explored where bpf_timer_start would clear the bit when (re)starting the
timer under timer-&gt;lock. This would ensure serialized access to the
cancelling bit, but may allow it to be cleared before in-flight
hrtimer_cancel has finished executing, such that lockups can occur
again.

Thus, we choose an atomic counter to keep track of all outstanding
cancellation requests and use it to prevent lockups in case callbacks
attempt to cancel each other while executing in parallel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228979">SUSE bug 1228979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42240</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/bhi: Avoid warning in #DB handler due to BHI mitigation

When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set
then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the
clear_bhb_loop() before the TF flag is cleared. This causes the #DB handler
(exc_debug_kernel()) to issue a warning because single-step is used outside the
entry_SYSENTER_compat() function.

To address this issue, entry_SYSENTER_compat() should use CLEAR_BRANCH_HISTORY
after making sure the TF flag is cleared.

The problem can be reproduced with the following sequence:

  $ cat sysenter_step.c
  int main()
  { asm("pushf; pop %ax; bts $8,%ax; push %ax; popf; sysenter"); }

  $ gcc -o sysenter_step sysenter_step.c

  $ ./sysenter_step
  Segmentation fault (core dumped)

The program is expected to crash, and the #DB handler will issue a warning.

Kernel log:

  WARNING: CPU: 27 PID: 7000 at arch/x86/kernel/traps.c:1009 exc_debug_kernel+0xd2/0x160
  ...
  RIP: 0010:exc_debug_kernel+0xd2/0x160
  ...
  Call Trace:
  &lt;#DB&gt;
   ? show_regs+0x68/0x80
   ? __warn+0x8c/0x140
   ? exc_debug_kernel+0xd2/0x160
   ? report_bug+0x175/0x1a0
   ? handle_bug+0x44/0x90
   ? exc_invalid_op+0x1c/0x70
   ? asm_exc_invalid_op+0x1f/0x30
   ? exc_debug_kernel+0xd2/0x160
   exc_debug+0x43/0x50
   asm_exc_debug+0x1e/0x40
  RIP: 0010:clear_bhb_loop+0x0/0xb0
  ...
  &lt;/#DB&gt;
  &lt;TASK&gt;
   ? entry_SYSENTER_compat_after_hwframe+0x6e/0x8d
  &lt;/TASK&gt;

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42244</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: serial: mos7840: fix crash on resume

Since commit c49cfa917025 ("USB: serial: use generic method if no
alternative is provided in usb serial layer"), USB serial core calls the
generic resume implementation when the driver has not provided one.

This can trigger a crash on resume with mos7840 since support for
multiple read URBs was added back in 2011. Specifically, both port read
URBs are now submitted on resume for open ports, but the context pointer
of the second URB is left set to the core rather than mos7840 port
structure.

Fix this by implementing dedicated suspend and resume functions for
mos7840.

Tested with Delock 87414 USB 2.0 to 4x serial adapter.

[ johan: analyse crash and rewrite commit message; set busy flag on
         resume; drop bulk-in check; drop unnecessary usb_kill_urb() ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228967">SUSE bug 1228967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42246</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket

When using a BPF program on kernel_connect(), the call can return -EPERM. This
causes xs_tcp_setup_socket() to loop forever, filling up the syslog and causing
the kernel to potentially freeze up.

Neil suggested:

  This will propagate -EPERM up into other layers which might not be ready
  to handle it. It might be safer to map EPERM to an error we would be more
  likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.

ECONNREFUSED as error seems reasonable. For programs setting a different error
can be out of reach (see handling in 4fbac77d2d09) in particular on kernels
which do not have f10d05966196 ("bpf: Make BPF_PROG_RUN_ARRAY return -err
instead of allow boolean"), thus given that it is better to simply remap for
consistent behavior. UDP does handle EPERM in xs_udp_send_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228989">SUSE bug 1228989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42247</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: allowedips: avoid unaligned 64-bit memory accesses

On the parisc platform, the kernel issues kernel warnings because
swap_endian() tries to load a 128-bit IPv6 address from an unaligned
memory location:

 Kernel: unaligned access to 0x55f4688c in wg_allowedips_insert_v6+0x2c/0x80 [wireguard] (iir 0xf3010df)
 Kernel: unaligned access to 0x55f46884 in wg_allowedips_insert_v6+0x38/0x80 [wireguard] (iir 0xf2010dc)

Avoid such unaligned memory accesses by instead using the
get_unaligned_be64() helper macro.

[Jason: replace src[8] in original patch with src+8]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228988">SUSE bug 1228988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42253</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42253" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: pca953x: fix pca953x_irq_bus_sync_unlock race

Ensure that `i2c_lock' is held when setting interrupt latch and mask in
pca953x_irq_bus_sync_unlock() in order to avoid races.

The other (non-probe) call site pca953x_gpio_set_multiple() ensures the
lock is held before calling pca953x_write_regs().

The problem occurred when a request raced against irq_bus_sync_unlock()
approximately once per thousand reboots on an i.MX8MP based system.

 * Normal case

   0-0022: write register AI|3a {03,02,00,00,01} Input latch P0
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3

 * Race case

   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|08 {03,02,00,00,01} *** Wrong register ***
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229005">SUSE bug 1229005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42259</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Fix Virtual Memory mapping boundaries calculation

Calculating the size of the mapped area as the lesser value
between the requested size and the actual size does not consider
the partial mapping offset. This can cause page fault access.

Fix the calculation of the starting and ending addresses, the
total size is now deduced from the difference between the end and
start addresses.

Additionally, the calculations have been rewritten in a clearer
and more understandable form.

[Joonas: Add Requires: tag]
Requires: 60a2066c5005 ("drm/i915/gem: Adjust vma offset for framebuffer mmap offset")
(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229156">SUSE bug 1229156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42265</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42265" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions

both callers have verified that fd is not greater than -&gt;max_fds;
however, misprediction might end up with
        tofree = fdt-&gt;fd[fd];
being speculatively executed.  That's wrong for the same reasons
why it's wrong in close_fd()/file_close_fd_locked(); the same
solution applies - array_index_nospec(fd, fdt-&gt;max_fds) could differ
from fd only in case of speculative execution on mispredicted path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42268</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42268" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix missing lock on sync reset reload

On sync reset reload work, when remote host updates devlink on reload
actions performed on that host, it misses taking devlink lock before
calling devlink_remote_reload_actions_performed() which results in
triggering lock assert like the following:

WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50
…
 CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S      W          6.10.0-rc2+ #116
 Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015
 Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core]
 RIP: 0010:devl_assert_locked+0x3e/0x50
…
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0xa4/0x210
  ? devl_assert_locked+0x3e/0x50
  ? report_bug+0x160/0x280
  ? handle_bug+0x3f/0x80
  ? exc_invalid_op+0x17/0x40
  ? asm_exc_invalid_op+0x1a/0x20
  ? devl_assert_locked+0x3e/0x50
  devlink_notify+0x88/0x2b0
  ? mlx5_attach_device+0x20c/0x230 [mlx5_core]
  ? __pfx_devlink_notify+0x10/0x10
  ? process_one_work+0x4b6/0xbb0
  process_one_work+0x4b6/0xbb0
[…]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229391">SUSE bug 1229391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42271</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/iucv: fix use after free in iucv_sock_close()

iucv_sever_path() is called from process context and from bh context.
iucv-&gt;path is used as indicator whether somebody else is taking care of
severing the path (or it is already removed / never existed).
This needs to be done with atomic compare and swap, otherwise there is a
small window where iucv_sock_close() will try to work with a path that has
already been severed and freed by iucv_callback_connrej() called by
iucv_tasklet_fn().

Example:
[452744.123844] Call Trace:
[452744.123845] ([&lt;0000001e87f03880&gt;] 0x1e87f03880)
[452744.123966]  [&lt;00000000d593001e&gt;] iucv_path_sever+0x96/0x138
[452744.124330]  [&lt;000003ff801ddbca&gt;] iucv_sever_path+0xc2/0xd0 [af_iucv]
[452744.124336]  [&lt;000003ff801e01b6&gt;] iucv_sock_close+0xa6/0x310 [af_iucv]
[452744.124341]  [&lt;000003ff801e08cc&gt;] iucv_sock_release+0x3c/0xd0 [af_iucv]
[452744.124345]  [&lt;00000000d574794e&gt;] __sock_release+0x5e/0xe8
[452744.124815]  [&lt;00000000d5747a0c&gt;] sock_close+0x34/0x48
[452744.124820]  [&lt;00000000d5421642&gt;] __fput+0xba/0x268
[452744.124826]  [&lt;00000000d51b382c&gt;] task_work_run+0xbc/0xf0
[452744.124832]  [&lt;00000000d5145710&gt;] do_notify_resume+0x88/0x90
[452744.124841]  [&lt;00000000d5978096&gt;] system_call+0xe2/0x2c8
[452744.125319] Last Breaking-Event-Address:
[452744.125321]  [&lt;00000000d5930018&gt;] iucv_path_sever+0x90/0x138
[452744.125324]
[452744.125325] Kernel panic - not syncing: Fatal exception in interrupt

Note that bh_lock_sock() is not serializing the tasklet context against
process context, because the check for sock_owned_by_user() and
corresponding handling is missing.

Ideas for a future clean-up patch:
A) Correct usage of bh_lock_sock() in tasklet context, as described in
Re-enqueue, if needed. This may require adding return values to the
tasklet functions and thus changes to all users of iucv.

B) Change iucv tasklet into worker and use only lock_sock() in af_iucv.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229401">SUSE bug 1229401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42274</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "ALSA: firewire-lib: operate for period elapse event in process context"

Commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event
in process context") removed the process context workqueue from
amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to remove
its overhead.

With RME Fireface 800, this lead to a regression since
Kernels 5.14.0, causing an AB/BA deadlock competition for the
substream lock with eventual system freeze under ALSA operation:

thread 0:
    * (lock A) acquire substream lock by
	snd_pcm_stream_lock_irq() in
	snd_pcm_status64()
    * (lock B) wait for tasklet to finish by calling
    	tasklet_unlock_spin_wait() in
	tasklet_disable_in_atomic() in
	ohci_flush_iso_completions() of ohci.c

thread 1:
    * (lock B) enter tasklet
    * (lock A) attempt to acquire substream lock,
    	waiting for it to be released:
	snd_pcm_stream_lock_irqsave() in
    	snd_pcm_period_elapsed() in
	update_pcm_pointers() in
	process_ctx_payloads() in
	process_rx_packets() of amdtp-stream.c

? tasklet_unlock_spin_wait
 &lt;/NMI&gt;
 &lt;TASK&gt;
ohci_flush_iso_completions firewire_ohci
amdtp_domain_stream_pcm_pointer snd_firewire_lib
snd_pcm_update_hw_ptr0 snd_pcm
snd_pcm_status64 snd_pcm

? native_queued_spin_lock_slowpath
 &lt;/NMI&gt;
 &lt;IRQ&gt;
_raw_spin_lock_irqsave
snd_pcm_period_elapsed snd_pcm
process_rx_packets snd_firewire_lib
irq_target_callback snd_firewire_lib
handle_it_packet firewire_ohci
context_tasklet firewire_ohci

Restore the process context work queue to prevent deadlock
AB/BA deadlock competition for ALSA substream lock of
snd_pcm_stream_lock_irq() in snd_pcm_status64()
and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed().

revert commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period
elapse event in process context")

Replace inline description to prevent future deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229417">SUSE bug 1229417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42276</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: add missing condition check for existence of mapped data

nvme_map_data() is called when request has physical segments, hence
the nvme_unmap_data() should have same condition to avoid dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229410">SUSE bug 1229410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42277</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en

In sprd_iommu_cleanup() before calling function sprd_iommu_hw_en()
dom-&gt;sdev is equal to NULL, which leads to null dereference.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229409">SUSE bug 1229409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42280</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: Fix a use after free in hfcmulti_tx()

Don't dereference *sp after calling dev_kfree_skb(*sp).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229388">SUSE bug 1229388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42281</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a segment issue when downgrading gso_size

Linearize the skb when downgrading gso_size because it may trigger a
BUG_ON() later when the skb is segmented as described in [1,2].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229386">SUSE bug 1229386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42283</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: Initialize all fields in dumped nexthops

struct nexthop_grp contains two reserved fields that are not initialized by
nla_put_nh_group(), and carry garbage. This can be observed e.g. with
strace (edited for clarity):

    # ip nexthop add id 1 dev lo
    # ip nexthop add id 101 group 1
    # strace -e recvmsg ip nexthop get id 101
    ...
    recvmsg(... [{nla_len=12, nla_type=NHA_GROUP},
                 [{id=1, weight=0, resvd1=0x69, resvd2=0x67}]] ...) = 52

The fields are reserved and therefore not currently used. But as they are, they
leak kernel memory, and the fact they are not just zero complicates repurposing
of the fields for new ends. Initialize the full structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229383">SUSE bug 1229383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42284</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Return non-zero value from tipc_udp_addr2str() on error

tipc_udp_addr2str() should return non-zero value if the UDP media
address is invalid. Otherwise, a buffer overflow access can occur in
tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
media address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229382">SUSE bug 1229382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42285</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix a use-after-free related to destroying CM IDs

iw_conn_req_handler() associates a new struct rdma_id_private (conn_id) with
an existing struct iw_cm_id (cm_id) as follows:

        conn_id-&gt;cm_id.iw = cm_id;
        cm_id-&gt;context = conn_id;
        cm_id-&gt;cm_handler = cma_iw_handler;

rdma_destroy_id() frees both the cm_id and the struct rdma_id_private. Make
sure that cm_work_handler() does not trigger a use-after-free by only
freeing of the struct rdma_id_private after all pending work has finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229381">SUSE bug 1229381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42286</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: validate nvme_local_port correctly

The driver load failed with error message,

qla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef

and with a kernel crash,

	BUG: unable to handle kernel NULL pointer dereference at 0000000000000070
	Workqueue: events_unbound qla_register_fcport_fn [qla2xxx]
	RIP: 0010:nvme_fc_register_remoteport+0x16/0x430 [nvme_fc]
	RSP: 0018:ffffaaa040eb3d98 EFLAGS: 00010282
	RAX: 0000000000000000 RBX: ffff9dfb46b78c00 RCX: 0000000000000000
	RDX: ffff9dfb46b78da8 RSI: ffffaaa040eb3e08 RDI: 0000000000000000
	RBP: ffff9dfb612a0a58 R08: ffffffffaf1d6270 R09: 3a34303a30303030
	R10: 34303a303030305b R11: 2078787832616c71 R12: ffff9dfb46b78dd4
	R13: ffff9dfb46b78c24 R14: ffff9dfb41525300 R15: ffff9dfb46b78da8
	FS:  0000000000000000(0000) GS:ffff9dfc67c00000(0000) knlGS:0000000000000000
	CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
	CR2: 0000000000000070 CR3: 000000018da10004 CR4: 00000000000206f0
	Call Trace:
	qla_nvme_register_remote+0xeb/0x1f0 [qla2xxx]
	? qla2x00_dfs_create_rport+0x231/0x270 [qla2xxx]
	qla2x00_update_fcport+0x2a1/0x3c0 [qla2xxx]
	qla_register_fcport_fn+0x54/0xc0 [qla2xxx]

Exit the qla_nvme_register_remote() function when qla_nvme_register_hba()
fails and correctly validate nvme_local_port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229395">SUSE bug 1229395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42287</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Complete command early within lock

A crash was observed while performing NPIV and FW reset,

 BUG: kernel NULL pointer dereference, address: 000000000000001c
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 1 PREEMPT_RT SMP NOPTI
 RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0
 RSP: 0018:ffffc90026f47b88 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000002
 RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8881041130d0
 RBP: ffff8881041130d0 R08: 0000000000000000 R09: 0000000000000034
 R10: ffffc90026f47c48 R11: 0000000000000031 R12: 0000000000000000
 R13: 0000000000000000 R14: ffff8881565e4a20 R15: 0000000000000000
 FS: 00007f4c69ed3d00(0000) GS:ffff889faac80000(0000) knlGS:0000000000000000
 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000000001c CR3: 0000000288a50002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1a/0x60
 ? page_fault_oops+0x16f/0x4a0
 ? do_user_addr_fault+0x174/0x7f0
 ? exc_page_fault+0x69/0x1a0
 ? asm_exc_page_fault+0x22/0x30
 ? dma_direct_unmap_sg+0x51/0x1e0
 ? preempt_count_sub+0x96/0xe0
 qla2xxx_qpair_sp_free_dma+0x29f/0x3b0 [qla2xxx]
 qla2xxx_qpair_sp_compl+0x60/0x80 [qla2xxx]
 __qla2x00_abort_all_cmds+0xa2/0x450 [qla2xxx]

The command completion was done early while aborting the commands in driver
unload path but outside lock to avoid the WARN_ON condition of performing
dma_free_attr within the lock. However this caused race condition while
command completion via multiple paths causing system crash.

Hence complete the command early in unload path but within the lock to
avoid race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229392">SUSE bug 1229392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42288</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix for possible memory corruption

Init Control Block is dereferenced incorrectly.  Correctly dereference ICB
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229398">SUSE bug 1229398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42289</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: During vport delete send async logout explicitly

During vport delete, it is observed that during unload we hit a crash
because of stale entries in outstanding command array.  For all these stale
I/O entries, eh_abort was issued and aborted (fast_fail_io = 2009h) but
I/Os could not complete while vport delete is in process of deleting.

  BUG: kernel NULL pointer dereference, address: 000000000000001c
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  Workqueue: qla2xxx_wq qla_do_work [qla2xxx]
  RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0
  RSP: 0018:ffffa1e1e150fc68 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000001
  RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8ce208a7a0d0
  RBP: ffff8ce208a7a0d0 R08: 0000000000000000 R09: ffff8ce378aac9c8
  R10: ffff8ce378aac8a0 R11: ffffa1e1e150f9d8 R12: 0000000000000000
  R13: 0000000000000000 R14: ffff8ce378aac9c8 R15: 0000000000000000
  FS:  0000000000000000(0000) GS:ffff8d217f000000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000000000001c CR3: 0000002089acc000 CR4: 0000000000350ee0
  Call Trace:
  &lt;TASK&gt;
  qla2xxx_qpair_sp_free_dma+0x417/0x4e0
  ? qla2xxx_qpair_sp_compl+0x10d/0x1a0
  ? qla2x00_status_entry+0x768/0x2830
  ? newidle_balance+0x2f0/0x430
  ? dequeue_entity+0x100/0x3c0
  ? qla24xx_process_response_queue+0x6a1/0x19e0
  ? __schedule+0x2d5/0x1140
  ? qla_do_work+0x47/0x60
  ? process_one_work+0x267/0x440
  ? process_one_work+0x440/0x440
  ? worker_thread+0x2d/0x3d0
  ? process_one_work+0x440/0x440
  ? kthread+0x156/0x180
  ? set_kthread_struct+0x50/0x50
  ? ret_from_fork+0x22/0x30
  &lt;/TASK&gt;

Send out async logout explicitly for all the ports during vport delete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229399">SUSE bug 1229399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42291</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42291" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Add a per-VF limit on number of FDIR filters

While the iavf driver adds a s/w limit (128) on the number of FDIR
filters that the VF can request, a malicious VF driver can request more
than that and exhaust the resources for other VFs.

Add a similar limit in ice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229374">SUSE bug 1229374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42292</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kobject_uevent: Fix OOB access within zap_modalias_env()

zap_modalias_env() wrongly calculates size of memory block to move, so
will cause OOB memory access issue if variable MODALIAS is not the last
one within its @env parameter, fixed by correcting size to memmove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229373">SUSE bug 1229373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42295</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: handle inconsistent state in nilfs_btnode_create_block()

Syzbot reported that a buffer state inconsistency was detected in
nilfs_btnode_create_block(), triggering a kernel bug.

It is not appropriate to treat this inconsistency as a bug; it can occur
if the argument block address (the buffer index of the newly created
block) is a virtual block number and has been reallocated due to
corruption of the bitmap used to manage its allocation state.

So, modify nilfs_btnode_create_block() and its callers to treat it as a
possible filesystem error, rather than triggering a kernel bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229370">SUSE bug 1229370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42301</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dev/parport: fix the array out-of-bounds risk

Fixed array out-of-bounds issues caused by sprintf
by replacing it with snprintf for safer data copying,
ensuring the destination buffer is not overflowed.

Below is the stack trace I encountered during the actual issue:

[ 66.575408s] [pid:5118,cpu4,QThread,4]Kernel panic - not syncing: stack-protector:
Kernel stack is corrupted in: do_hardware_base_addr+0xcc/0xd0 [parport]
[ 66.575408s] [pid:5118,cpu4,QThread,5]CPU: 4 PID: 5118 Comm:
QThread Tainted: G S W O 5.10.97-arm64-desktop #7100.57021.2
[ 66.575439s] [pid:5118,cpu4,QThread,6]TGID: 5087 Comm: EFileApp
[ 66.575439s] [pid:5118,cpu4,QThread,7]Hardware name: HUAWEI HUAWEI QingYun
PGUX-W515x-B081/SP1PANGUXM, BIOS 1.00.07 04/29/2024
[ 66.575439s] [pid:5118,cpu4,QThread,8]Call trace:
[ 66.575469s] [pid:5118,cpu4,QThread,9] dump_backtrace+0x0/0x1c0
[ 66.575469s] [pid:5118,cpu4,QThread,0] show_stack+0x14/0x20
[ 66.575469s] [pid:5118,cpu4,QThread,1] dump_stack+0xd4/0x10c
[ 66.575500s] [pid:5118,cpu4,QThread,2] panic+0x1d8/0x3bc
[ 66.575500s] [pid:5118,cpu4,QThread,3] __stack_chk_fail+0x2c/0x38
[ 66.575500s] [pid:5118,cpu4,QThread,4] do_hardware_base_addr+0xcc/0xd0 [parport]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42302</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal

Keith reports a use-after-free when a DPC event occurs concurrently to
hot-removal of the same portion of the hierarchy:

The dpc_handler() awaits readiness of the secondary bus below the
Downstream Port where the DPC event occurred.  To do so, it polls the
config space of the first child device on the secondary bus.  If that
child device is concurrently removed, accesses to its struct pci_dev
cause the kernel to oops.

That's because pci_bridge_wait_for_secondary_bus() neglects to hold a
reference on the child device.  Before v6.3, the function was only
called on resume from system sleep or on runtime resume.  Holding a
reference wasn't necessary back then because the pciehp IRQ thread
could never run concurrently.  (On resume from system sleep, IRQs are
not enabled until after the resume_noirq phase.  And runtime resume is
always awaited before a PCI device is removed.)

However starting with v6.3, pci_bridge_wait_for_secondary_bus() is also
called on a DPC event.  Commit 53b54ad074de ("PCI/DPC: Await readiness
of secondary bus after reset"), which introduced that, failed to
appreciate that pci_bridge_wait_for_secondary_bus() now needs to hold a
reference on the child device because dpc_handler() and pciehp may
indeed run concurrently.  The commit was backported to v5.10+ stable
kernels, so that's the oldest one affected.

Add the missing reference acquisition.

Abridged stack trace:

  BUG: unable to handle page fault for address: 00000000091400c0
  CPU: 15 PID: 2464 Comm: irq/53-pcie-dpc 6.9.0
  RIP: pci_bus_read_config_dword+0x17/0x50
  pci_dev_wait()
  pci_bridge_wait_for_secondary_bus()
  dpc_reset_link()
  pcie_do_recovery()
  dpc_handler()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229366">SUSE bug 1229366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42304</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: make sure the first directory block is not a hole

The syzbot constructs a directory that has no dirblock but is non-inline,
i.e. the first directory block is a hole. And no errors are reported when
creating files in this directory in the following flow.

    ext4_mknod
     ...
      ext4_add_entry
        // Read block 0
        ext4_read_dirblock(dir, block, DIRENT)
          bh = ext4_bread(NULL, inode, block, 0)
          if (!bh &amp;&amp; (type == INDEX || type == DIRENT_HTREE))
          // The first directory block is a hole
          // But type == DIRENT, so no error is reported.

After that, we get a directory block without '.' and '..' but with a valid
dentry. This may cause some code that relies on dot or dotdot (such as
make_indexed_dir()) to crash.

Therefore when ext4_read_dirblock() finds that the first directory block
is a hole report that the filesystem is corrupted and return an error to
avoid loading corrupted data from disk causing something bad.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229364">SUSE bug 1229364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42305</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: check dot and dotdot of dx_root before making dir indexed

Syzbot reports a issue as follows:
============================================
BUG: unable to handle page fault for address: ffffed11022e24fe
PGD 23ffee067 P4D 23ffee067 PUD 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 PID: 5079 Comm: syz-executor306 Not tainted 6.10.0-rc5-g55027e689933 #0
Call Trace:
 &lt;TASK&gt;
 make_indexed_dir+0xdaf/0x13c0 fs/ext4/namei.c:2341
 ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2451
 ext4_rename fs/ext4/namei.c:3936 [inline]
 ext4_rename2+0x26e5/0x4370 fs/ext4/namei.c:4214
[...]
============================================

The immediate cause of this problem is that there is only one valid dentry
for the block to be split during do_split, so split==0 results in out of
bounds accesses to the map triggering the issue.

    do_split
      unsigned split
      dx_make_map
       count = 1
      split = count/2 = 0;
      continued = hash2 == map[split - 1].hash;
       ---&gt; map[4294967295]

The maximum length of a filename is 255 and the minimum block size is 1024,
so it is always guaranteed that the number of entries is greater than or
equal to 2 when do_split() is called.

But syzbot's crafted image has no dot and dotdot in dir, and the dentry
distribution in dirblock is as follows:

  bus     dentry1          hole           dentry2           free
|xx--|xx-------------|...............|xx-------------|...............|
0   12 (8+248)=256  268     256     524 (8+256)=264 788     236     1024

So when renaming dentry1 increases its name_len length by 1, neither hole
nor free is sufficient to hold the new dentry, and make_indexed_dir() is
called.

In make_indexed_dir() it is assumed that the first two entries of the
dirblock must be dot and dotdot, so bus and dentry1 are left in dx_root
because they are treated as dot and dotdot, and only dentry2 is moved
to the new leaf block. That's why count is equal to 1.

Therefore add the ext4_check_dx_root() helper function to add more sanity
checks to dot and dotdot before starting the conversion to avoid the above
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229363">SUSE bug 1229363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42306</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid using corrupted block bitmap buffer

When the filesystem block bitmap is corrupted, we detect the corruption
while loading the bitmap and fail the allocation with error. However the
next allocation from the same bitmap will notice the bitmap buffer is
already loaded and tries to allocate from the bitmap with mixed results
(depending on the exact nature of the bitmap corruption). Fix the
problem by using BH_verified bit to indicate whether the bitmap is valid
or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229362">SUSE bug 1229362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42308</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42308" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229411">SUSE bug 1229411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42309</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes

In psb_intel_lvds_get_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229359">SUSE bug 1229359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42310</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes

In cdv_intel_lvds_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229358">SUSE bug 1229358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42311</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()

Syzbot reports uninitialized value access issue as below:

loop0: detected capacity change from 0 to 64
=====================================================
BUG: KMSAN: uninit-value in hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30
 hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30
 d_revalidate fs/namei.c:862 [inline]
 lookup_fast+0x89e/0x8e0 fs/namei.c:1649
 walk_component fs/namei.c:2001 [inline]
 link_path_walk+0x817/0x1480 fs/namei.c:2332
 path_lookupat+0xd9/0x6f0 fs/namei.c:2485
 filename_lookup+0x22e/0x740 fs/namei.c:2515
 user_path_at_empty+0x8b/0x390 fs/namei.c:2924
 user_path_at include/linux/namei.h:57 [inline]
 do_mount fs/namespace.c:3689 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x66b/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x140 fs/namespace.c:3875
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

BUG: KMSAN: uninit-value in hfs_ext_read_extent fs/hfs/extent.c:196 [inline]
BUG: KMSAN: uninit-value in hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366
 hfs_ext_read_extent fs/hfs/extent.c:196 [inline]
 hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366
 block_read_full_folio+0x4ff/0x11b0 fs/buffer.c:2271
 hfs_read_folio+0x55/0x60 fs/hfs/inode.c:39
 filemap_read_folio+0x148/0x4f0 mm/filemap.c:2426
 do_read_cache_folio+0x7c8/0xd90 mm/filemap.c:3553
 do_read_cache_page mm/filemap.c:3595 [inline]
 read_cache_page+0xfb/0x2f0 mm/filemap.c:3604
 read_mapping_page include/linux/pagemap.h:755 [inline]
 hfs_btree_open+0x928/0x1ae0 fs/hfs/btree.c:78
 hfs_mdb_get+0x260c/0x3000 fs/hfs/mdb.c:204
 hfs_fill_super+0x1fb1/0x2790 fs/hfs/super.c:406
 mount_bdev+0x628/0x920 fs/super.c:1359
 hfs_mount+0xcd/0xe0 fs/hfs/super.c:456
 legacy_get_tree+0x167/0x2e0 fs/fs_context.c:610
 vfs_get_tree+0xdc/0x5d0 fs/super.c:1489
 do_new_mount+0x7a9/0x16f0 fs/namespace.c:3145
 path_mount+0xf98/0x26a0 fs/namespace.c:3475
 do_mount fs/namespace.c:3488 [inline]
 __do_sys_mount fs/namespace.c:3697 [inline]
 __se_sys_mount+0x919/0x9e0 fs/namespace.c:3674
 __ia32_sys_mount+0x15b/0x1b0 fs/namespace.c:3674
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

Uninit was created at:
 __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590
 __alloc_pages_node include/linux/gfp.h:238 [inline]
 alloc_pages_node include/linux/gfp.h:261 [inline]
 alloc_slab_page mm/slub.c:2190 [inline]
 allocate_slab mm/slub.c:2354 [inline]
 new_slab+0x2d7/0x1400 mm/slub.c:2407
 ___slab_alloc+0x16b5/0x3970 mm/slub.c:3540
 __slab_alloc mm/slub.c:3625 [inline]
 __slab_alloc_node mm/slub.c:3678 [inline]
 slab_alloc_node mm/slub.c:3850 [inline]
 kmem_cache_alloc_lru+0x64d/0xb30 mm/slub.c:3879
 alloc_inode_sb include/linux/fs.h:3018 [inline]
 hfs_alloc_inode+0x5a/0xc0 fs/hfs/super.c:165
 alloc_inode+0x83/0x440 fs/inode.c:260
 new_inode_pseudo fs/inode.c:1005 [inline]
 new_inode+0x38/0x4f0 fs/inode.c:1031
 hfs_new_inode+0x61/0x1010 fs/hfs/inode.c:186
 hfs_mkdir+0x54/0x250 fs/hfs/dir.c:228
 vfs_mkdir+0x49a/0x700 fs/namei.c:4126
 do_mkdirat+0x529/0x810 fs/namei.c:4149
 __do_sys_mkdirat fs/namei.c:4164 [inline]
 __se_sys_mkdirat fs/namei.c:4162 [inline]
 __x64_sys_mkdirat+0xc8/0x120 fs/namei.c:4162
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

It missed to initialize .tz_secondswest, .cached_start and .cached_blocks
fields in struct hfs_inode_info after hfs_alloc_inode(), fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229413">SUSE bug 1229413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42312</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysctl: always initialize i_uid/i_gid

Always initialize i_uid/i_gid inside the sysfs core so set_ownership()
can safely skip setting them.

Commit 5ec27ec735ba ("fs/proc/proc_sysctl.c: fix the default values of
i_uid/i_gid on /proc/sys inodes.") added defaults for i_uid/i_gid when
set_ownership() was not implemented. It also missed adjusting
net_ctl_set_ownership() to use the same default values in case the
computation of a better value failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229357">SUSE bug 1229357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42313</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: fix use after free in vdec_close

There appears to be a possible use after free with vdec_close().
The firmware will add buffer release work to the work queue through
HFI callbacks as a normal part of decoding. Randomly closing the
decoder device from userspace during normal decoding can incur
a read after free for inst.

Fix it by cancelling the work in vdec_close.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229356">SUSE bug 1229356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42315</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42315" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix potential deadlock on __exfat_get_dentry_set

When accessing a file with more entries than ES_MAX_ENTRY_NUM, the bh-array
is allocated in __exfat_get_entry_set. The problem is that the bh-array is
allocated with GFP_KERNEL. It does not make sense. In the following cases,
a deadlock for sbi-&gt;s_lock between the two processes may occur.

       CPU0                CPU1
       ----                ----
  kswapd
   balance_pgdat
    lock(fs_reclaim)
                      exfat_iterate
                       lock(&amp;sbi-&gt;s_lock)
                       exfat_readdir
                        exfat_get_uniname_from_ext_entry
                         exfat_get_dentry_set
                          __exfat_get_dentry_set
                           kmalloc_array
                            ...
                            lock(fs_reclaim)
    ...
    evict
     exfat_evict_inode
      lock(&amp;sbi-&gt;s_lock)

To fix this, let's allocate bh-array with GFP_NOFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229354">SUSE bug 1229354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42318</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

landlock: Don't lose track of restrictions on cred_transfer

When a process' cred struct is replaced, this _almost_ always invokes
the cred_prepare LSM hook; but in one special case (when
KEYCTL_SESSION_TO_PARENT updates the parent's credentials), the
cred_transfer LSM hook is used instead.  Landlock only implements the
cred_prepare hook, not cred_transfer, so KEYCTL_SESSION_TO_PARENT causes
all information on Landlock restrictions to be lost.

This basically means that a process with the ability to use the fork()
and keyctl() syscalls can get rid of all Landlock restrictions on
itself.

Fix it by adding a cred_transfer hook that does the same thing as the
existing cred_prepare hook. (Implemented by having hook_cred_prepare()
call hook_cred_transfer() so that the two functions are less likely to
accidentally diverge in the future.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229351">SUSE bug 1229351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42319</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42319" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()

When mtk-cmdq unbinds, a WARN_ON message with condition
pm_runtime_get_sync() &lt; 0 occurs.

According to the call tracei below:
  cmdq_mbox_shutdown
  mbox_free_channel
  mbox_controller_unregister
  __devm_mbox_controller_unregister
  ...

The root cause can be deduced to be calling pm_runtime_get_sync() after
calling pm_runtime_disable() as observed below:
1. CMDQ driver uses devm_mbox_controller_register() in cmdq_probe()
   to bind the cmdq device to the mbox_controller, so
   devm_mbox_controller_unregister() will automatically unregister
   the device bound to the mailbox controller when the device-managed
   resource is removed. That means devm_mbox_controller_unregister()
   and cmdq_mbox_shoutdown() will be called after cmdq_remove().
2. CMDQ driver also uses devm_pm_runtime_enable() in cmdq_probe() after
   devm_mbox_controller_register(), so that devm_pm_runtime_disable()
   will be called after cmdq_remove(), but before
   devm_mbox_controller_unregister().

To fix this problem, cmdq_probe() needs to move
devm_mbox_controller_register() after devm_pm_runtime_enable() to make
devm_pm_runtime_disable() be called after
devm_mbox_controller_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229350">SUSE bug 1229350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42320</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42320" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix error checks in dasd_copy_pair_store()

dasd_add_busid() can return an error via ERR_PTR() if an allocation
fails. However, two callsites in dasd_copy_pair_store() do not check
the result, potentially resulting in a NULL pointer dereference. Fix
this by checking the result with IS_ERR() and returning the error up
the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229349">SUSE bug 1229349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42322</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: properly dereference pe in ip_vs_add_service

Use pe directly to resolve sparse warning:

  net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229347">SUSE bug 1229347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43374</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43374" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43374" ref_url="https://www.suse.com/security/cve/CVE-2024-43374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020043.html" source="SUSE-SU"/>
    <description>
    The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43374/">CVE-2024-43374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43374">CVE-2024-43374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229238">SUSE bug 1229238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958176" comment="vim-data-common-9.1.0836-150500.20.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958237" comment="vim-small-9.1.0836-150500.20.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages

On big endian architectures, it is possible to run into a memory out of
bounds pointer dereference when FCP targets are zoned.

In lpfc_prep_embed_io, the memcpy(ptr, fcp_cmnd, sgl-&gt;sge_len) is
referencing a little endian formatted sgl-&gt;sge_len value.  So, the memcpy
can cause big endian systems to crash.

Redefine the *sgl ptr as a struct sli4_sge_le to make it clear that we are
referring to a little endian formatted data structure.  And, update the
routine with proper le32_to_cpu macro usages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229318">SUSE bug 1229318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: missing check virtio

Two missing check in virtio_net_hdr_to_skb() allowed syzbot
to crash kernels again

1. After the skb_segment function the buffer may become non-linear
(nr_frags != 0), but since the SKBTX_SHARED_FRAG flag is not set anywhere
the __skb_linearize function will not be executed, then the buffer will
remain non-linear. Then the condition (offset &gt;= skb_headlen(skb))
becomes true, which causes WARN_ON_ONCE in skb_checksum_help.

2. The struct sk_buff and struct virtio_net_hdr members must be
mathematically related.
(gso_size) must be greater than (needed) otherwise WARN_ON_ONCE.
(remainder) must be greater than (needed) otherwise WARN_ON_ONCE.
(remainder) may be 0 if division is without remainder.

offset+2 (4191) &gt; skb_headlen() (1116)
WARNING: CPU: 1 PID: 5084 at net/core/dev.c:3303 skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303
Modules linked in:
CPU: 1 PID: 5084 Comm: syz-executor336 Not tainted 6.7.0-rc3-syzkaller-00014-gdf60cee26a2e #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
RIP: 0010:skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303
Code: 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 52 01 00 00 44 89 e2 2b 53 74 4c 89 ee 48 c7 c7 40 57 e9 8b e8 af 8f dd f8 90 &lt;0f&gt; 0b 90 90 e9 87 fe ff ff e8 40 0f 6e f9 e9 4b fa ff ff 48 89 ef
RSP: 0018:ffffc90003a9f338 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff888025125780 RCX: ffffffff814db209
RDX: ffff888015393b80 RSI: ffffffff814db216 RDI: 0000000000000001
RBP: ffff8880251257f4 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000045c
R13: 000000000000105f R14: ffff8880251257f0 R15: 000000000000105d
FS:  0000555555c24380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 0000000023151000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ip_do_fragment+0xa1b/0x18b0 net/ipv4/ip_output.c:777
 ip_fragment.constprop.0+0x161/0x230 net/ipv4/ip_output.c:584
 ip_finish_output_gso net/ipv4/ip_output.c:286 [inline]
 __ip_finish_output net/ipv4/ip_output.c:308 [inline]
 __ip_finish_output+0x49c/0x650 net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 NF_HOOK_COND include/linux/netfilter.h:303 [inline]
 ip_output+0x13b/0x2a0 net/ipv4/ip_output.c:433
 dst_output include/net/dst.h:451 [inline]
 ip_local_out+0xaf/0x1a0 net/ipv4/ip_output.c:129
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ipip6_tunnel_xmit net/ipv6/sit.c:1034 [inline]
 sit_tunnel_xmit+0xed2/0x28f0 net/ipv6/sit.c:1076
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3545 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3561
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4346
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 packet_xmit+0x257/0x380 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x24ca/0x5240 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0xd5/0x180 net/socket.c:745
 __sys_sendto+0x255/0x340 net/socket.c:2190
 __do_sys_sendto net/socket.c:2202 [inline]
 __se_sys_sendto net/socket.c:2198 [inline]
 __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Found by Linux Verification Center (linuxtesting.org) with Syzkaller
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43818</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: Adjust error handling in case of absent codec device

acpi_get_first_physical_node() can return NULL in several cases (no such
device, ACPI table error, reference count drop to 0, etc).
Existing check just emit error message, but doesn't perform return.
Then this NULL pointer is passed to devm_acpi_dev_add_driver_gpios()
where it is dereferenced.

Adjust this error handling by adding error code return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229296">SUSE bug 1229296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kvm: s390: Reject memory region operations for ucontrol VMs

This change rejects the KVM_SET_USER_MEMORY_REGION and
KVM_SET_USER_MEMORY_REGION2 ioctls when called on a ucontrol VM.
This is necessary since ucontrol VMs have kvm-&gt;arch.gmap set to 0 and
would thus result in a null pointer dereference further in.
Memory management needs to be performed in userspace and using the
ioctls KVM_S390_UCAS_MAP and KVM_S390_UCAS_UNMAP.

Also improve s390 specific documentation for KVM_SET_USER_MEMORY_REGION
and KVM_SET_USER_MEMORY_REGION2.

[frankja@linux.ibm.com: commit message spelling fix, subject prefix fix]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229290">SUSE bug 1229290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix a possible null pointer dereference

In function lpfc_xcvr_data_show, the memory allocation with kmalloc might
fail, thereby making rdp_context a null pointer. In the following context
and functions that use this pointer, there are dereferencing operations,
leading to null pointer dereference.

To fix this issue, a null pointer check should be added. If it is null,
use scnprintf to notify the user and return len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229315">SUSE bug 1229315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43823</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()

If IORESOURCE_MEM is not provided in Device Tree due to
any error, resource_list_first_type() will return NULL and
pci_parse_request_of_pci_ranges() will just emit a warning.

This will cause a NULL pointer dereference. Fix this bug by adding NULL
return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229303">SUSE bug 1229303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix infinite loop when replaying fast_commit

When doing fast_commit replay an infinite loop may occur due to an
uninitialized extent_status struct.  ext4_ext_determine_insert_hole() does
not detect the replay and calls ext4_es_find_extent_range(), which will
return immediately without initializing the 'es' variable.

Because 'es' contains garbage, an integer overflow may happen causing an
infinite loop in this function, easily reproducible using fstest generic/039.

This commit fixes this issue by unconditionally initializing the structure
in function ext4_es_find_extent_range().

Thanks to Zhang Yi, for figuring out the real problem!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229394">SUSE bug 1229394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43829</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/qxl: Add check for drm_cvt_mode

Add check for the return value of drm_cvt_mode() and return the error if
it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229341">SUSE bug 1229341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: trigger: Unregister sysfs attributes before calling deactivate()

Triggers which have trigger specific sysfs attributes typically store
related data in trigger-data allocated by the activate() callback and
freed by the deactivate() callback.

Calling device_remove_groups() after calling deactivate() leaves a window
where the sysfs attributes show/store functions could be called after
deactivation and then operate on the just freed trigger-data.

Move the device_remove_groups() call to before deactivate() to close
this race window.

This also makes the deactivation path properly do things in reverse order
of the activation path which calls the activate() callback before calling
device_add_groups().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229305">SUSE bug 1229305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43831</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Handle invalid decoder vsi

Handle an invalid decoder vsi in vpu_dec_init to ensure the decoder vsi
is valid for future use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229309">SUSE bug 1229309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: fix invalid wait context of page_pool_destroy()

If the driver uses a page pool, it creates a page pool with
page_pool_create().
The reference count of page pool is 1 as default.
A page pool will be destroyed only when a reference count reaches 0.
page_pool_destroy() is used to destroy page pool, it decreases a
reference count.
When a page pool is destroyed, -&gt;disconnect() is called, which is
mem_allocator_disconnect().
This function internally acquires mutex_lock().

If the driver uses XDP, it registers a memory model with
xdp_rxq_info_reg_mem_model().
The xdp_rxq_info_reg_mem_model() internally increases a page pool
reference count if a memory model is a page pool.
Now the reference count is 2.

To destroy a page pool, the driver should call both page_pool_destroy()
and xdp_unreg_mem_model().
The xdp_unreg_mem_model() internally calls page_pool_destroy().
Only page_pool_destroy() decreases a reference count.

If a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we
will face an invalid wait context warning.
Because xdp_unreg_mem_model() calls page_pool_destroy() with
rcu_read_lock().
The page_pool_destroy() internally acquires mutex_lock().

Splat looks like:
=============================
[ BUG: Invalid wait context ]
6.10.0-rc6+ #4 Tainted: G W
-----------------------------
ethtool/1806 is trying to lock:
ffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150
other info that might help us debug this:
context-{5:5}
3 locks held by ethtool/1806:
stack backtrace:
CPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed
Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x7e/0xc0
__lock_acquire+0x1681/0x4de0
? _printk+0x64/0xe0
? __pfx_mark_lock.part.0+0x10/0x10
? __pfx___lock_acquire+0x10/0x10
lock_acquire+0x1b3/0x580
? mem_allocator_disconnect+0x73/0x150
? __wake_up_klogd.part.0+0x16/0xc0
? __pfx_lock_acquire+0x10/0x10
? dump_stack_lvl+0x91/0xc0
__mutex_lock+0x15c/0x1690
? mem_allocator_disconnect+0x73/0x150
? __pfx_prb_read_valid+0x10/0x10
? mem_allocator_disconnect+0x73/0x150
? __pfx_llist_add_batch+0x10/0x10
? console_unlock+0x193/0x1b0
? lockdep_hardirqs_on+0xbe/0x140
? __pfx___mutex_lock+0x10/0x10
? tick_nohz_tick_stopped+0x16/0x90
? __irq_work_queue_local+0x1e5/0x330
? irq_work_queue+0x39/0x50
? __wake_up_klogd.part.0+0x79/0xc0
? mem_allocator_disconnect+0x73/0x150
mem_allocator_disconnect+0x73/0x150
? __pfx_mem_allocator_disconnect+0x10/0x10
? mark_held_locks+0xa5/0xf0
? rcu_is_watching+0x11/0xb0
page_pool_release+0x36e/0x6d0
page_pool_destroy+0xd7/0x440
xdp_unreg_mem_model+0x1a7/0x2a0
? __pfx_xdp_unreg_mem_model+0x10/0x10
? kfree+0x125/0x370
? bnxt_free_ring.isra.0+0x2eb/0x500
? bnxt_free_mem+0x5ac/0x2500
xdp_rxq_info_unreg+0x4a/0xd0
bnxt_free_mem+0x1356/0x2500
bnxt_close_nic+0xf0/0x3b0
? __pfx_bnxt_close_nic+0x10/0x10
? ethnl_parse_bit+0x2c6/0x6d0
? __pfx___nla_validate_parse+0x10/0x10
? __pfx_ethnl_parse_bit+0x10/0x10
bnxt_set_features+0x2a8/0x3e0
__netdev_update_features+0x4dc/0x1370
? ethnl_parse_bitset+0x4ff/0x750
? __pfx_ethnl_parse_bitset+0x10/0x10
? __pfx___netdev_update_features+0x10/0x10
? mark_held_locks+0xa5/0xf0
? _raw_spin_unlock_irqrestore+0x42/0x70
? __pm_runtime_resume+0x7d/0x110
ethnl_set_features+0x32d/0xa20

To fix this problem, it uses rhashtable_lookup_fast() instead of
rhashtable_lookup() with rcu_read_lock().
Using xa without rcu_read_lock() here is safe.
xa is freed by __xdp_mem_allocator_rcu_free() and this is called by
call_rcu() of mem_xa_remove().
The mem_xa_remove() is called by page_pool_destroy() if a reference
count reaches 0.
The xa is already protected by the reference count mechanism well in the
control plane.
So removing rcu_read_lock() for page_pool_destroy() is safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229314">SUSE bug 1229314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43835" ref_url="https://www.suse.com/security/cve/CVE-2024-43835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Fix napi_skb_cache_put warning

After the commit bdacf3e34945 ("net: Use nested-BH locking for
napi_alloc_cache.") was merged, the following warning began to appear:

	 WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0

	  __warn+0x12f/0x340
	  napi_skb_cache_put+0x82/0x4b0
	  napi_skb_cache_put+0x82/0x4b0
	  report_bug+0x165/0x370
	  handle_bug+0x3d/0x80
	  exc_invalid_op+0x1a/0x50
	  asm_exc_invalid_op+0x1a/0x20
	  __free_old_xmit+0x1c8/0x510
	  napi_skb_cache_put+0x82/0x4b0
	  __free_old_xmit+0x1c8/0x510
	  __free_old_xmit+0x1c8/0x510
	  __pfx___free_old_xmit+0x10/0x10

The issue arises because virtio is assuming it's running in NAPI context
even when it's not, such as in the netpoll case.

To resolve this, modify virtnet_poll_tx() to only set NAPI when budget
is available. Same for virtnet_poll_cleantx(), which always assumed that
it was in a NAPI context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43835/">CVE-2024-43835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43835">CVE-2024-43835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229289">SUSE bug 1229289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43837</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix null pointer dereference in resolve_prog_type() for BPF_PROG_TYPE_EXT

When loading a EXT program without specifying `attr-&gt;attach_prog_fd`,
the `prog-&gt;aux-&gt;dst_prog` will be null. At this time, calling
resolve_prog_type() anywhere will result in a null pointer dereference.

Example stack trace:

[    8.107863] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
[    8.108262] Mem abort info:
[    8.108384]   ESR = 0x0000000096000004
[    8.108547]   EC = 0x25: DABT (current EL), IL = 32 bits
[    8.108722]   SET = 0, FnV = 0
[    8.108827]   EA = 0, S1PTW = 0
[    8.108939]   FSC = 0x04: level 0 translation fault
[    8.109102] Data abort info:
[    8.109203]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    8.109399]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    8.109614]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    8.109836] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101354000
[    8.110011] [0000000000000004] pgd=0000000000000000, p4d=0000000000000000
[    8.112624] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    8.112783] Modules linked in:
[    8.113120] CPU: 0 PID: 99 Comm: may_access_dire Not tainted 6.10.0-rc3-next-20240613-dirty #1
[    8.113230] Hardware name: linux,dummy-virt (DT)
[    8.113390] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    8.113429] pc : may_access_direct_pkt_data+0x24/0xa0
[    8.113746] lr : add_subprog_and_kfunc+0x634/0x8e8
[    8.113798] sp : ffff80008283b9f0
[    8.113813] x29: ffff80008283b9f0 x28: ffff800082795048 x27: 0000000000000001
[    8.113881] x26: ffff0000c0bb2600 x25: 0000000000000000 x24: 0000000000000000
[    8.113897] x23: ffff0000c1134000 x22: 000000000001864f x21: ffff0000c1138000
[    8.113912] x20: 0000000000000001 x19: ffff0000c12b8000 x18: ffffffffffffffff
[    8.113929] x17: 0000000000000000 x16: 0000000000000000 x15: 0720072007200720
[    8.113944] x14: 0720072007200720 x13: 0720072007200720 x12: 0720072007200720
[    8.113958] x11: 0720072007200720 x10: 0000000000f9fca4 x9 : ffff80008021f4e4
[    8.113991] x8 : 0101010101010101 x7 : 746f72705f6d656d x6 : 000000001e0e0f5f
[    8.114006] x5 : 000000000001864f x4 : ffff0000c12b8000 x3 : 000000000000001c
[    8.114020] x2 : 0000000000000002 x1 : 0000000000000000 x0 : 0000000000000000
[    8.114126] Call trace:
[    8.114159]  may_access_direct_pkt_data+0x24/0xa0
[    8.114202]  bpf_check+0x3bc/0x28c0
[    8.114214]  bpf_prog_load+0x658/0xa58
[    8.114227]  __sys_bpf+0xc50/0x2250
[    8.114240]  __arm64_sys_bpf+0x28/0x40
[    8.114254]  invoke_syscall.constprop.0+0x54/0xf0
[    8.114273]  do_el0_svc+0x4c/0xd8
[    8.114289]  el0_svc+0x3c/0x140
[    8.114305]  el0t_64_sync_handler+0x134/0x150
[    8.114331]  el0t_64_sync+0x168/0x170
[    8.114477] Code: 7100707f 54000081 f9401c00 f9403800 (b9400403)
[    8.118672] ---[ end trace 0000000000000000 ]---

One way to fix it is by forcing `attach_prog_fd` non-empty when
bpf_prog_load(). But this will lead to `libbpf_probe_bpf_prog_type`
API broken which use verifier log to probe prog type and will log
nothing if we reject invalid EXT prog before bpf_check().

Another way is by adding null check in resolve_prog_type().

The issue was introduced by commit 4a9c7bbe2ed4 ("bpf: Resolve to
prog-&gt;aux-&gt;dst_prog-&gt;type only for BPF_PROG_TYPE_EXT") which wanted
to correct type resolution for BPF_PROG_TYPE_TRACING programs. Before
that, the type resolution of BPF_PROG_TYPE_EXT prog actually follows
the logic below:

  prog-&gt;aux-&gt;dst_prog ? prog-&gt;aux-&gt;dst_prog-&gt;type : prog-&gt;type;

It implies that when EXT program is not yet attached to `dst_prog`,
the prog type should be EXT itself. This code worked fine in the past.
So just keep using it.

Fix this by returning `prog-&gt;type` for BPF_PROG_TYPE_EXT if `dst_prog`
is not present in resolve_prog_type().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229297">SUSE bug 1229297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43839</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bna: adjust 'name' buf size of bna_tcb and bna_ccb structures

To have enough space to write all possible sprintf() args. Currently
'name' size is 16, but the first '%s' specifier may already need at
least 16 characters, since 'bnad-&gt;netdev-&gt;name' is used there.

For '%d' specifiers, assume that they require:
 * 1 char for 'tx_id + tx_info-&gt;tcb[i]-&gt;id' sum, BNAD_MAX_TXQ_PER_TX is 8
 * 2 chars for 'rx_id + rx_info-&gt;rx_ctrl[i].ccb-&gt;id', BNAD_MAX_RXP_PER_RX
   is 16

And replace sprintf with snprintf.

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229301">SUSE bug 1229301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: virt_wifi: avoid reporting connection success with wrong SSID

When user issues a connection with a different SSID than the one
virt_wifi has advertised, the __cfg80211_connect_result() will
trigger the warning: WARN_ON(bss_not_found).

The issue is because the connection code in virt_wifi does not
check the SSID from user space (it only checks the BSSID), and
virt_wifi will call cfg80211_connect_result() with WLAN_STATUS_SUCCESS
even if the SSID is different from the one virt_wifi has advertised.
Eventually cfg80211 won't be able to find the cfg80211_bss and generate
the warning.

Fixed it by checking the SSID (from user space) in the connection code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229304">SUSE bug 1229304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43842" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()

In rtw89_sta_info_get_iter() 'status-&gt;he_gi' is compared to array size.
But then 'rate-&gt;he_gi' is used as array index instead of 'status-&gt;he_gi'.
This can lead to go beyond array boundaries in case of 'rate-&gt;he_gi' is
not equal to 'status-&gt;he_gi' and is bigger than array size. Looks like
"copy-paste" mistake.

Fix this mistake by replacing 'rate-&gt;he_gi' with 'status-&gt;he_gi'.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229317">SUSE bug 1229317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43846</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib: objagg: Fix general protection fault

The library supports aggregation of objects into other objects only if
the parent object does not have a parent itself. That is, nesting is not
supported.

Aggregation happens in two cases: Without and with hints, where hints
are a pre-computed recommendation on how to aggregate the provided
objects.

Nesting is not possible in the first case due to a check that prevents
it, but in the second case there is no check because the assumption is
that nesting cannot happen when creating objects based on hints. The
violation of this assumption leads to various warnings and eventually to
a general protection fault [1].

Before fixing the root cause, error out when nesting happens and warn.

[1]
general protection fault, probably for non-canonical address 0xdead000000000d90: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 1083 Comm: kworker/1:9 Tainted: G        W          6.9.0-rc6-custom-gd9b4f1cca7fb #7
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_entry_add+0x256/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270
 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229360">SUSE bug 1229360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: pdr: protect locator_addr with the main mutex

If the service locator server is restarted fast enough, the PDR can
rewrite locator_addr fields concurrently. Protect them by placing
modification of those fields under the main pdr-&gt;lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229307">SUSE bug 1229307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: Prevent UAF in proc_cpuset_show()

An UAF can happen when /proc/cpuset is read as reported in [1].

This can be reproduced by the following methods:
1.add an mdelay(1000) before acquiring the cgroup_lock In the
 cgroup_path_ns function.
2.$cat /proc/&lt;pid&gt;/cpuset   repeatly.
3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/
$umount /sys/fs/cgroup/cpuset/   repeatly.

The race that cause this bug can be shown as below:

(umount)		|	(cat /proc/&lt;pid&gt;/cpuset)
css_release		|	proc_cpuset_show
css_release_work_fn	|	css = task_get_css(tsk, cpuset_cgrp_id);
css_free_rwork_fn	|	cgroup_path_ns(css-&gt;cgroup, ...);
cgroup_destroy_root	|	mutex_lock(&amp;cgroup_mutex);
rebind_subsystems	|
cgroup_free_root 	|
			|	// cgrp was freed, UAF
			|	cgroup_path_ns_locked(cgrp,..);

When the cpuset is initialized, the root node top_cpuset.css.cgrp
will point to &amp;cgrp_dfl_root.cgrp. In cgroup v1, the mount operation will
allocate cgroup_root, and top_cpuset.css.cgrp will point to the allocated
&amp;cgroup_root.cgrp. When the umount operation is executed,
top_cpuset.css.cgrp will be rebound to &amp;cgrp_dfl_root.cgrp.

The problem is that when rebinding to cgrp_dfl_root, there are cases
where the cgroup_root allocated by setting up the root for cgroup v1
is cached. This could lead to a Use-After-Free (UAF) if it is
subsequently freed. The descendant cgroups of cgroup v1 can only be
freed after the css is released. However, the css of the root will never
be released, yet the cgroup_root should be freed when it is unmounted.
This means that obtaining a reference to the css of the root does
not guarantee that css.cgrp-&gt;root will not be freed.

Fix this problem by using rcu_read_lock in proc_cpuset_show().
As cgroup_root is kfree_rcu after commit d23b5c577715
("cgroup: Make operations on the cgroup root_list RCU safe"),
css-&gt;cgroup won't be freed during the critical section.
To call cgroup_path_ns_locked, css_set_lock is needed, so it is safe to
replace task_get_css with task_css.

[1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: initialize integrity buffer to zero before writing it to media

Metadata added by bio_integrity_prep is using plain kmalloc, which leads
to random kernel memory being written media.  For PI metadata this is
limited to the app tag that isn't used by kernel generated metadata,
but for non-PI metadata the entire buffer leaks kernel memory.

Fix this by adding the __GFP_ZERO flag to allocations for writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43856</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma: fix call order in dmam_free_coherent

dmam_free_coherent() frees a DMA allocation, which makes the
freed vaddr available for reuse, then calls devres_destroy()
to remove and free the data structure used to track the DMA
allocation. Between the two calls, it is possible for a
concurrent task to make an allocation with the same vaddr
and add it to the devres list.

If this happens, there will be two entries in the devres list
with the same vaddr and devres_destroy() can free the wrong
entry, triggering the WARN_ON() in dmam_match.

Fix by destroying the devres entry before freeing the DMA
allocation.

  kokonut //net/encryption
    http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229346">SUSE bug 1229346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43858</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix array-index-out-of-bounds in diFree
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229414">SUSE bug 1229414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: imx_rproc: Skip over memory region when node value is NULL

In imx_rproc_addr_init() "nph = of_count_phandle_with_args()" just counts
number of phandles. But phandles may be empty. So of_parse_phandle() in
the parsing loop (0 &lt; a &lt; nph) may return NULL which is later dereferenced.
Adjust this issue by adding NULL-return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[Fixed title to fit within the prescribed 70-75 charcters]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229319">SUSE bug 1229319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: qmi_wwan: fix memory leak for not ip packets

Free the unused skb when not ip packets arrive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229553">SUSE bug 1229553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix a deadlock in dma buf fence polling

Introduce a version of the fence ops that on release doesn't remove
the fence from the pending list, and thus doesn't require a lock to
fix poll-&gt;fence wait-&gt;fence unref deadlocks.

vmwgfx overwrites the wait callback to iterate over the list of all
fences and update their status, to do that it holds a lock to prevent
the list modifcations from other threads. The fence destroy callback
both deletes the fence and removes it from the list of pending
fences, for which it holds a lock.

dma buf polling cb unrefs a fence after it's been signaled: so the poll
calls the wait, which signals the fences, which are being destroyed.
The destruction tries to acquire the lock on the pending fences list
which it can never get because it's held by the wait from which it
was called.

Old bug, but not a lot of userspace apps were using dma-buf polling
interfaces. Fix those, in particular this fixes KDE stalls/deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229497">SUSE bug 1229497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43866</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Always drain health in shutdown callback

There is no point in recovery during device shutdown. if health
work started need to wait for it to avoid races and NULL pointer
access.

Hence, drain health WQ on shutdown callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229495">SUSE bug 1229495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: prime: fix refcount underflow

Calling nouveau_bo_ref() on a nouveau_bo without initializing it (and
hence the backing ttm_bo) leads to a refcount underflow.

Instead of calling nouveau_bo_ref() in the unwind path of
drm_gem_object_init(), clean things up manually.

(cherry picked from commit 1b93f3e89d03cfc576636e195466a0d728ad8de5)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229493">SUSE bug 1229493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devres: Fix memory leakage caused by driver API devm_free_percpu()

It will cause memory leakage when use driver API devm_free_percpu()
to free memory allocated by devm_alloc_percpu(), fixed by using
devres_release() instead of devres_destroy() within devm_free_percpu().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229490">SUSE bug 1229490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43872</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix soft lockup under heavy CEQE load

CEQEs are handled in interrupt handler currently. This may cause the
CPU core staying in interrupt context too long and lead to soft lockup
under heavy load.

Handle CEQEs in BH workqueue and set an upper limit for the number of
CEQE handled by a single call of work handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229489">SUSE bug 1229489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43873</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost/vsock: always initialize seqpacket_allow

There are two issues around seqpacket_allow:
1. seqpacket_allow is not initialized when socket is
   created. Thus if features are never set, it will be
   read uninitialized.
2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
   then seqpacket_allow will not be cleared appropriately
   (existing apps I know about don't usually do this but
    it's legal and there's no way to be sure no one relies
    on this).

To fix:
	- initialize seqpacket_allow after allocation
	- set it unconditionally in set_features
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229488">SUSE bug 1229488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43879</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()

Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in
cfg80211_calculate_bitrate_he(), leading to below warning:

kernel: invalid HE MCS: bw:6, ru:6
kernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]

Fix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229482">SUSE bug 1229482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43880</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_erp: Fix object nesting warning

ACLs in Spectrum-2 and newer ASICs can reside in the algorithmic TCAM
(A-TCAM) or in the ordinary circuit TCAM (C-TCAM). The former can
contain more ACLs (i.e., tc filters), but the number of masks in each
region (i.e., tc chain) is limited.

In order to mitigate the effects of the above limitation, the device
allows filters to share a single mask if their masks only differ in up
to 8 consecutive bits. For example, dst_ip/25 can be represented using
dst_ip/24 with a delta of 1 bit. The C-TCAM does not have a limit on the
number of masks being used (and therefore does not support mask
aggregation), but can contain a limited number of filters.

The driver uses the "objagg" library to perform the mask aggregation by
passing it objects that consist of the filter's mask and whether the
filter is to be inserted into the A-TCAM or the C-TCAM since filters in
different TCAMs cannot share a mask.

The set of created objects is dependent on the insertion order of the
filters and is not necessarily optimal. Therefore, the driver will
periodically ask the library to compute a more optimal set ("hints") by
looking at all the existing objects.

When the library asks the driver whether two objects can be aggregated
the driver only compares the provided masks and ignores the A-TCAM /
C-TCAM indication. This is the right thing to do since the goal is to
move as many filters as possible to the A-TCAM. The driver also forbids
two identical masks from being aggregated since this can only happen if
one was intentionally put in the C-TCAM to avoid a conflict in the
A-TCAM.

The above can result in the following set of hints:

H1: {mask X, A-TCAM} -&gt; H2: {mask Y, A-TCAM} // X is Y + delta
H3: {mask Y, C-TCAM} -&gt; H4: {mask Z, A-TCAM} // Y is Z + delta

After getting the hints from the library the driver will start migrating
filters from one region to another while consulting the computed hints
and instructing the device to perform a lookup in both regions during
the transition.

Assuming a filter with mask X is being migrated into the A-TCAM in the
new region, the hints lookup will return H1. Since H2 is the parent of
H1, the library will try to find the object associated with it and
create it if necessary in which case another hints lookup (recursive)
will be performed. This hints lookup for {mask Y, A-TCAM} will either
return H2 or H3 since the driver passes the library an object comparison
function that ignores the A-TCAM / C-TCAM indication.

This can eventually lead to nested objects which are not supported by
the library [1].

Fix by removing the object comparison function from both the driver and
the library as the driver was the only user. That way the lookup will
only return exact matches.

I do not have a reliable reproducer that can reproduce the issue in a
timely manner, but before the fix the issue would reproduce in several
minutes and with the fix it does not reproduce in over an hour.

Note that the current usefulness of the hints is limited because they
include the C-TCAM indication and represent aggregation that cannot
actually happen. This will be addressed in net-next.

[1]
WARNING: CPU: 0 PID: 153 at lib/objagg.c:170 objagg_obj_parent_assign+0xb5/0xd0
Modules linked in:
CPU: 0 PID: 153 Comm: kworker/0:18 Not tainted 6.9.0-rc6-custom-g70fbc2c1c38b #42
Hardware name: Mellanox Technologies Ltd. MSN3700C/VMOD0008, BIOS 5.11 10/10/2018
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:objagg_obj_parent_assign+0xb5/0xd0
[...]
Call Trace:
 &lt;TASK&gt;
 __objagg_obj_get+0x2bb/0x580
 objagg_obj_get+0xe/0x80
 mlxsw_sp_acl_erp_mask_get+0xb5/0xf0
 mlxsw_sp_acl_atcam_entry_add+0xe8/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270
 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510
 process_one_work+0x151/0x370
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229481">SUSE bug 1229481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43882</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exec: Fix ToCToU between perm check and set-uid/gid usage

When opening a file for exec via do_filp_open(), permission checking is
done against the file's metadata at that moment, and on success, a file
pointer is passed back. Much later in the execve() code path, the file
metadata (specifically mode, uid, and gid) is used to determine if/how
to set the uid and gid. However, those values may have changed since the
permissions check, meaning the execution may gain unintended privileges.

For example, if a file could change permissions from executable and not
set-id:

---------x 1 root root 16048 Aug  7 13:16 target

to set-id and non-executable:

---S------ 1 root root 16048 Aug  7 13:16 target

it is possible to gain root privileges when execution should have been
disallowed.

While this race condition is rare in real-world scenarios, it has been
observed (and proven exploitable) when package managers are updating
the setuid bits of installed programs. Such files start with being
world-executable but then are adjusted to be group-exec with a set-uid
bit. For example, "chmod o-x,u+s target" makes "target" executable only
by uid "root" and gid "cdrom", while also becoming setuid-root:

-rwxr-xr-x 1 root cdrom 16048 Aug  7 13:16 target

becomes:

-rwsr-xr-- 1 root cdrom 16048 Aug  7 13:16 target

But racing the chmod means users without group "cdrom" membership can
get the permission to execute "target" just before the chmod, and when
the chmod finishes, the exec reaches brpm_fill_uid(), and performs the
setuid to root, violating the expressed authorization of "only cdrom
group members can setuid to root".

Re-check that we still have execute permissions in case the metadata
has changed. It would be better to keep a copy from the perm-check time,
but until we can do that refactoring, the least-bad option is to do a
full inode_permission() call (under inode lock). It is understood that
this is safe against dead-locks, but hardly optimal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229504">SUSE bug 1229504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43883</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: vhci-hcd: Do not drop references before new references are gained

At a few places the driver carries stale pointers
to references that can still be used. Make sure that does not happen.
This strictly speaking closes ZDI-CAN-22273, though there may be
similar races in the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Add error handling to pair_device()

hci_conn_params_add() never checks for a NULL value and could lead to a NULL
pointer dereference causing a crash.

Fixed by adding error handling in the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229739">SUSE bug 1229739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43889</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix possible divide-by-0 panic in padata_mt_helper()

We are hit with a not easily reproducible divide-by-0 panic in padata.c at
bootup time.

  [   10.017908] Oops: divide error: 0000 1 PREEMPT SMP NOPTI
  [   10.017908] CPU: 26 PID: 2627 Comm: kworker/u1666:1 Not tainted 6.10.0-15.el10.x86_64 #1
  [   10.017908] Hardware name: Lenovo ThinkSystem SR950 [7X12CTO1WW]/[7X12CTO1WW], BIOS [PSE140J-2.30] 07/20/2021
  [   10.017908] Workqueue: events_unbound padata_mt_helper
  [   10.017908] RIP: 0010:padata_mt_helper+0x39/0xb0
    :
  [   10.017963] Call Trace:
  [   10.017968]  &lt;TASK&gt;
  [   10.018004]  ? padata_mt_helper+0x39/0xb0
  [   10.018084]  process_one_work+0x174/0x330
  [   10.018093]  worker_thread+0x266/0x3a0
  [   10.018111]  kthread+0xcf/0x100
  [   10.018124]  ret_from_fork+0x31/0x50
  [   10.018138]  ret_from_fork_asm+0x1a/0x30
  [   10.018147]  &lt;/TASK&gt;

Looking at the padata_mt_helper() function, the only way a divide-by-0
panic can happen is when ps-&gt;chunk_size is 0.  The way that chunk_size is
initialized in padata_do_multithreaded(), chunk_size can be 0 when the
min_chunk in the passed-in padata_mt_job structure is 0.

Fix this divide-by-0 panic by making sure that chunk_size will be at least
1 no matter what the input parameters are.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229743">SUSE bug 1229743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43890</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix overflow in get_free_elt()

"tracing_map-&gt;next_elt" in get_free_elt() is at risk of overflowing.

Once it overflows, new elements can still be inserted into the tracing_map
even though the maximum number of elements (`max_elts`) has been reached.
Continuing to insert elements after the overflow could result in the
tracing_map containing "tracing_map-&gt;max_size" elements, leaving no empty
entries.
If any attempt is made to insert an element into a full tracing_map using
`__tracing_map_insert()`, it will cause an infinite loop with preemption
disabled, leading to a CPU hang problem.

Fix this by preventing any further increments to "tracing_map-&gt;next_elt"
once it reaches "tracing_map-&gt;max_elt".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229764">SUSE bug 1229764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43892</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcg: protect concurrent access to mem_cgroup_idr

Commit 73f576c04b94 ("mm: memcontrol: fix cgroup creation failure after
many small jobs") decoupled the memcg IDs from the CSS ID space to fix the
cgroup creation failures.  It introduced IDR to maintain the memcg ID
space.  The IDR depends on external synchronization mechanisms for
modifications.  For the mem_cgroup_idr, the idr_alloc() and idr_replace()
happen within css callback and thus are protected through cgroup_mutex
from concurrent modifications.  However idr_remove() for mem_cgroup_idr
was not protected against concurrency and can be run concurrently for
different memcgs when they hit their refcnt to zero.  Fix that.

We have been seeing list_lru based kernel crashes at a low frequency in
our fleet for a long time.  These crashes were in different part of
list_lru code including list_lru_add(), list_lru_del() and reparenting
code.  Upon further inspection, it looked like for a given object (dentry
and inode), the super_block's list_lru didn't have list_lru_one for the
memcg of that object.  The initial suspicions were either the object is
not allocated through kmem_cache_alloc_lru() or somehow
memcg_list_lru_alloc() failed to allocate list_lru_one() for a memcg but
returned success.  No evidence were found for these cases.

Looking more deeply, we started seeing situations where valid memcg's id
is not present in mem_cgroup_idr and in some cases multiple valid memcgs
have same id and mem_cgroup_idr is pointing to one of them.  So, the most
reasonable explanation is that these situations can happen due to race
between multiple idr_remove() calls or race between
idr_alloc()/idr_replace() and idr_remove().  These races are causing
multiple memcgs to acquire the same ID and then offlining of one of them
would cleanup list_lrus on the system for all of them.  Later access from
other memcgs to the list_lru cause crashes due to missing list_lru_one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229761">SUSE bug 1229761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43893</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: core: check uartclk for zero to avoid divide by zero

Calling ioctl TIOCSSERIAL with an invalid baud_base can
result in uartclk being zero, which will result in a
divide by zero error in uart_get_divisor(). The check for
uartclk being zero in uart_set_info() needs to be done
before other settings are made as subsequent calls to
ioctl TIOCSSERIAL for the same port would be impacted if
the uartclk check was done where uartclk gets set.

Oops: divide error: 0000  PREEMPT SMP KASAN PTI
RIP: 0010:uart_get_divisor (drivers/tty/serial/serial_core.c:580)
Call Trace:
 &lt;TASK&gt;
serial8250_get_divisor (drivers/tty/serial/8250/8250_port.c:2576
    drivers/tty/serial/8250/8250_port.c:2589)
serial8250_do_set_termios (drivers/tty/serial/8250/8250_port.c:502
    drivers/tty/serial/8250/8250_port.c:2741)
serial8250_set_termios (drivers/tty/serial/8250/8250_port.c:2862)
uart_change_line_settings (./include/linux/spinlock.h:376
    ./include/linux/serial_core.h:608 drivers/tty/serial/serial_core.c:222)
uart_port_startup (drivers/tty/serial/serial_core.c:342)
uart_startup (drivers/tty/serial/serial_core.c:368)
uart_set_info (drivers/tty/serial/serial_core.c:1034)
uart_set_info_user (drivers/tty/serial/serial_core.c:1059)
tty_set_serial (drivers/tty/tty_io.c:2637)
tty_ioctl (drivers/tty/tty_io.c:2647 drivers/tty/tty_io.c:2791)
__x64_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:907
    fs/ioctl.c:893 fs/ioctl.c:893)
do_syscall_64 (arch/x86/entry/common.c:52
    (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1))
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Rule: add
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229759">SUSE bug 1229759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43894</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: fix null pointer dereference in drm_client_modeset_probe

In drm_client_modeset_probe(), the return value of drm_mode_duplicate() is
assigned to modeset-&gt;mode, which will lead to a possible NULL pointer
dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229746">SUSE bug 1229746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43895</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip Recompute DSC Params if no Stream on Link

[why]
Encounter NULL pointer dereference uner mst + dsc setup.

BUG: kernel NULL pointer dereference, address: 0000000000000008
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP NOPTI
    CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2
    Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022
    RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
    Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
    RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
    RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
    RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
    RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
    R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
    R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
    FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0
    Call Trace:
&lt;TASK&gt;
     ? __die+0x23/0x70
     ? page_fault_oops+0x171/0x4e0
     ? plist_add+0xbe/0x100
     ? exc_page_fault+0x7c/0x180
     ? asm_exc_page_fault+0x26/0x30
     ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
     ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
     compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     drm_atomic_check_only+0x5c5/0xa40
     drm_mode_atomic_ioctl+0x76e/0xbc0

[how]
dsc recompute should be skipped if no mode change detected on the new
request. If detected, keep checking whether the stream is already on
current state or not.

(cherry picked from commit 8151a6c13111b465dbabe07c19f572f7cbd16fef)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229755">SUSE bug 1229755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: drop bad gso csum_start and offset in virtio_net_hdr

Tighten csum_start and csum_offset checks in virtio_net_hdr_to_skb
for GSO packets.

The function already checks that a checksum requested with
VIRTIO_NET_HDR_F_NEEDS_CSUM is in skb linear. But for GSO packets
this might not hold for segs after segmentation.

Syzkaller demonstrated to reach this warning in skb_checksum_help

	offset = skb_checksum_start_offset(skb);
	ret = -EINVAL;
	if (WARN_ON_ONCE(offset &gt;= skb_headlen(skb)))

By injecting a TSO packet:

WARNING: CPU: 1 PID: 3539 at net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0
 ip_do_fragment+0x209/0x1b20 net/ipv4/ip_output.c:774
 ip_finish_output_gso net/ipv4/ip_output.c:279 [inline]
 __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301
 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x2296/0x2c70 net/ipv4/ip_tunnel.c:813
 __gre_xmit net/ipv4/ip_gre.c:469 [inline]
 ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661
 __netdev_start_xmit include/linux/netdevice.h:4850 [inline]
 netdev_start_xmit include/linux/netdevice.h:4864 [inline]
 xmit_one net/core/dev.c:3595 [inline]
 dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611
 __dev_queue_xmit+0x1b97/0x3c90 net/core/dev.c:4261
 packet_snd net/packet/af_packet.c:3073 [inline]

The geometry of the bad input packet at tcp_gso_segment:

[   52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0
[   52.003050][ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244
[   52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(size=1552 type=3 segs=0))
[   52.003050][ T8403] csum(0x60000c7 start=199 offset=1536
ip_summed=3 complete_sw=0 valid=0 level=0)

Mitigate with stricter input validation.

csum_offset: for GSO packets, deduce the correct value from gso_type.
This is already done for USO. Extend it to TSO. Let UFO be:
udp[46]_ufo_fragment ignores these fields and always computes the
checksum in software.

csum_start: finding the real offset requires parsing to the transport
header. Do not add a parser, use existing segmentation parsing. Thanks
to SKB_GSO_DODGY, that also catches bad packets that are hw offloaded.
Again test both TSO and USO. Do not test UFO for the above reason, and
do not test UDP tunnel offload.

GSO packet are almost always CHECKSUM_PARTIAL. USO packets may be
CHECKSUM_NONE since commit 10154dbded6d6 ("udp: Allow GSO transmit
from devices with no checksum offload"), but then still these fields
are initialized correctly in udp4_hwcsum/udp6_hwcsum_outgoing. So no
need to test for ip_summed == CHECKSUM_PARTIAL first.

This revises an existing fix mentioned in the Fixes tag, which broke
small packets with GSO offload, as detected by kselftests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229752">SUSE bug 1229752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43898</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229753">SUSE bug 1229753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null pointer deref in dcn20_resource.c

Fixes a hang thats triggered when MPV is run on a DCN401 dGPU:

mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all

and then enabling fullscreen playback (double click on the video)

The following calltrace will be seen:

[  181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  181.843997] #PF: supervisor instruction fetch in kernel mode
[  181.844003] #PF: error_code(0x0010) - not-present page
[  181.844009] PGD 0 P4D 0
[  181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI
[  181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G        W  OE      6.5.0-41-generic #41~22.04.2-Ubuntu
[  181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018
[  181.844044] RIP: 0010:0x0
[  181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[  181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246
[  181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004
[  181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400
[  181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c
[  181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8
[  181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005
[  181.844121] FS:  00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000
[  181.844128] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0
[  181.844141] Call Trace:
[  181.844146]  &lt;TASK&gt;
[  181.844153]  ? show_regs+0x6d/0x80
[  181.844167]  ? __die+0x24/0x80
[  181.844179]  ? page_fault_oops+0x99/0x1b0
[  181.844192]  ? do_user_addr_fault+0x31d/0x6b0
[  181.844204]  ? exc_page_fault+0x83/0x1b0
[  181.844216]  ? asm_exc_page_fault+0x27/0x30
[  181.844237]  dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu]
[  181.845115]  amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu]
[  181.845985]  amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu]
[  181.846848]  fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu]
[  181.847734]  fill_dc_plane_attributes+0x162/0x350 [amdgpu]
[  181.848748]  dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu]
[  181.849791]  ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu]
[  181.850840]  amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229754">SUSE bug 1229754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: xc2028: avoid use-after-free in load_firmware_cb()

syzkaller reported use-after-free in load_firmware_cb() [1].
The reason is because the module allocated a struct tuner in tuner_probe(),
and then the module initialization failed, the struct tuner was released.
A worker which created during module initialization accesses this struct
tuner later, it caused use-after-free.

The process is as follows:

task-6504           worker_thread
tuner_probe                             &lt;= alloc dvb_frontend [2]
...
request_firmware_nowait                 &lt;= create a worker
...
tuner_remove                            &lt;= free dvb_frontend
...
                    request_firmware_work_func  &lt;= the firmware is ready
                    load_firmware_cb    &lt;= but now the dvb_frontend has been freed

To fix the issue, check the dvd_frontend in load_firmware_cb(), if it is
null, report a warning and just return.

[1]:
    ==================================================================
     BUG: KASAN: use-after-free in load_firmware_cb+0x1310/0x17a0
     Read of size 8 at addr ffff8000d7ca2308 by task kworker/2:3/6504

     Call trace:
      load_firmware_cb+0x1310/0x17a0
      request_firmware_work_func+0x128/0x220
      process_one_work+0x770/0x1824
      worker_thread+0x488/0xea0
      kthread+0x300/0x430
      ret_from_fork+0x10/0x20

     Allocated by task 6504:
      kzalloc
      tuner_probe+0xb0/0x1430
      i2c_device_probe+0x92c/0xaf0
      really_probe+0x678/0xcd0
      driver_probe_device+0x280/0x370
      __device_attach_driver+0x220/0x330
      bus_for_each_drv+0x134/0x1c0
      __device_attach+0x1f4/0x410
      device_initial_probe+0x20/0x30
      bus_probe_device+0x184/0x200
      device_add+0x924/0x12c0
      device_register+0x24/0x30
      i2c_new_device+0x4e0/0xc44
      v4l2_i2c_new_subdev_board+0xbc/0x290
      v4l2_i2c_new_subdev+0xc8/0x104
      em28xx_v4l2_init+0x1dd0/0x3770

     Freed by task 6504:
      kfree+0x238/0x4e4
      tuner_remove+0x144/0x1c0
      i2c_device_remove+0xc8/0x290
      __device_release_driver+0x314/0x5fc
      device_release_driver+0x30/0x44
      bus_remove_device+0x244/0x490
      device_del+0x350/0x900
      device_unregister+0x28/0xd0
      i2c_unregister_device+0x174/0x1d0
      v4l2_device_unregister+0x224/0x380
      em28xx_v4l2_init+0x1d90/0x3770

     The buggy address belongs to the object at ffff8000d7ca2000
      which belongs to the cache kmalloc-2k of size 2048
     The buggy address is located 776 bytes inside of
      2048-byte region [ffff8000d7ca2000, ffff8000d7ca2800)
     The buggy address belongs to the page:
     page:ffff7fe00035f280 count:1 mapcount:0 mapping:ffff8000c001f000 index:0x0
     flags: 0x7ff800000000100(slab)
     raw: 07ff800000000100 ffff7fe00049d880 0000000300000003 ffff8000c001f000
     raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
     page dumped because: kasan: bad access detected

     Memory state around the buggy address:
      ffff8000d7ca2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ffff8000d7ca2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
     &gt;ffff8000d7ca2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                           ^
      ffff8000d7ca2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ffff8000d7ca2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
     ==================================================================

[2]
    Actually, it is allocated for struct tuner, and dvb_frontend is inside.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229756">SUSE bug 1229756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43902</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null checker before passing variables

Checks null pointer before passing variables to functions.

This fixes 3 NULL_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229767">SUSE bug 1229767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229781">SUSE bug 1229781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43904</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing

This commit adds null checks for the 'stream' and 'plane' variables in
the dcn30_apply_idle_power_optimizations function. These variables were
previously assumed to be null at line 922, but they were used later in
the code without checking if they were null. This could potentially lead
to a null pointer dereference, which would cause a crash.

The null checks ensure that 'stream' and 'plane' are not null before
they are used, preventing potential crashes.

Fixes the below static smatch checker:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922)
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229768">SUSE bug 1229768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr

Check return value and conduct null pointer handling to avoid null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229784">SUSE bug 1229784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43907</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules

Check the pointer value to fix potential null pointer
dereference
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229787">SUSE bug 1229787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the null pointer dereference to ras_manager

Check ras_manager before using it
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229788">SUSE bug 1229788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43909</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/pm: Fix the null pointer dereference for smu7

optimize the code to avoid pass a null pointer (hwmgr-&gt;backend)
to function smu7_update_edc_leakage_table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229789">SUSE bug 1229789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: disallow setting special AP channel widths

Setting the AP channel width is meant for use with the normal
20/40/... MHz channel width progression, and switching around
in S1G or narrow channels isn't supported. Disallow that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229830">SUSE bug 1229830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: avoid BUG_ON() while continue reshape after reassembling

Currently, mdadm support --revert-reshape to abort the reshape while
reassembling, as the test 07revert-grow. However, following BUG_ON()
can be triggerred by the test:

kernel BUG at drivers/md/raid5.c:6278!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
irq event stamp: 158985
CPU: 6 PID: 891 Comm: md0_reshape Not tainted 6.9.0-03335-g7592a0b0049a #94
RIP: 0010:reshape_request+0x3f1/0xe60
Call Trace:
 &lt;TASK&gt;
 raid5_sync_request+0x43d/0x550
 md_do_sync+0xb7a/0x2110
 md_thread+0x294/0x2b0
 kthread+0x147/0x1c0
 ret_from_fork+0x59/0x70
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Root cause is that --revert-reshape update the raid_disks from 5 to 4,
while reshape position is still set, and after reassembling the array,
reshape position will be read from super block, then during reshape the
checking of 'writepos' that is caculated by old reshape position will
fail.

Fix this panic the easy way first, by converting the BUG_ON() to
WARN_ON(), and stop the reshape if checkings fail.

Noted that mdadm must fix --revert-shape as well, and probably md/raid
should enhance metadata validation as well, however this means
reassemble will fail and there must be user tools to fix the wrong
metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229790">SUSE bug 1229790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4453</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9056" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1882-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1882-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035499.html" source="SUSE-SU"/>
    <description>
    GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-23896.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224806">SUSE bug 1224806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863551" comment="gstreamer-plugins-base-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863552" comment="libgstallocators-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863553" comment="libgstapp-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863554" comment="libgstaudio-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863555" comment="libgstgl-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863556" comment="libgstpbutils-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863557" comment="libgstriff-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863558" comment="libgsttag-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009863559" comment="libgstvideo-1_0-0-1.22.0-150500.3.8.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4467</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4467" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPDARJICNXP6BQXL6RDWC63AJMWSDEU5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-10-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227322">SUSE bug 1227322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940480" comment="qemu-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940454" comment="qemu-accel-tcg-x86-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940455" comment="qemu-arm-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940481" comment="qemu-audio-spice-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940482" comment="qemu-block-curl-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940483" comment="qemu-chardev-spice-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940484" comment="qemu-guest-agent-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940485" comment="qemu-hw-display-qxl-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940486" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940487" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940488" comment="qemu-hw-usb-redirect-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940280" comment="qemu-ipxe-1.0.0+-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940467" comment="qemu-s390x-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940288" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940289" comment="qemu-sgabios-8-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940489" comment="qemu-tools-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940490" comment="qemu-ui-opengl-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940491" comment="qemu-ui-spice-core-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940298" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940472" comment="qemu-x86-7.1.0-150500.49.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44931</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: prevent potential speculation leaks in gpio_device_get_desc()

Userspace may trigger a speculative read of an address outside the gpio
descriptor array.
Users can do that by calling gpio_ioctl() with an offset out of range.
Offset is copied from user and then used as an array index to get
the gpio descriptor without sanitization in gpio_device_get_desc().

This change ensures that the offset is sanitized by using
array_index_nospec() to mitigate any possibility of speculative
information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229837">SUSE bug 1229837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44932</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix UAFs when destroying the queues

The second tagged commit started sometimes (very rarely, but possible)
throwing WARNs from
net/core/page_pool.c:page_pool_disable_direct_recycling().
Turned out idpf frees interrupt vectors with embedded NAPIs *before*
freeing the queues making page_pools' NAPI pointers lead to freed
memory before these pools are destroyed by libeth.
It's not clear whether there are other accesses to the freed vectors
when destroying the queues, but anyway, we usually free queue/interrupt
vectors only when the queues are destroyed and the NAPIs are guaranteed
to not be referenced anywhere.

Invert the allocation and freeing logic making queue/interrupt vectors
be allocated first and freed last. Vectors don't require queues to be
present, so this is safe. Additionally, this change allows to remove
that useless queue-&gt;q_vector pointer cleanup, as vectors are still
valid when freeing the queues (+ both are freed within one function,
so it's not clear why nullify the pointers at all).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44935</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: Fix null-ptr-deref in reuseport_add_sock().

syzbot reported a null-ptr-deref while accessing sk2-&gt;sk_reuseport_cb in
reuseport_add_sock(). [0]

The repro first creates a listener with SO_REUSEPORT.  Then, it creates
another listener on the same port and concurrently closes the first
listener.

The second listen() calls reuseport_add_sock() with the first listener as
sk2, where sk2-&gt;sk_reuseport_cb is not expected to be cleared concurrently,
but the close() does clear it by reuseport_detach_sock().

The problem is SCTP does not properly synchronise reuseport_alloc(),
reuseport_add_sock(), and reuseport_detach_sock().

The caller of reuseport_alloc() and reuseport_{add,detach}_sock() must
provide synchronisation for sockets that are classified into the same
reuseport group.

Otherwise, such sockets form multiple identical reuseport groups, and
all groups except one would be silently dead.

  1. Two sockets call listen() concurrently
  2. No socket in the same group found in sctp_ep_hashtable[]
  3. Two sockets call reuseport_alloc() and form two reuseport groups
  4. Only one group hit first in __sctp_rcv_lookup_endpoint() receives
      incoming packets

Also, the reported null-ptr-deref could occur.

TCP/UDP guarantees that would not happen by holding the hash bucket lock.

Let's apply the locking strategy to __sctp_hash_endpoint() and
__sctp_unhash_endpoint().

[0]:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 1 UID: 0 PID: 10230 Comm: syz-executor119 Not tainted 6.10.0-syzkaller-12585-g301927d2d2eb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:reuseport_add_sock+0x27e/0x5e0 net/core/sock_reuseport.c:350
Code: 00 0f b7 5d 00 bf 01 00 00 00 89 de e8 1b a4 ff f7 83 fb 01 0f 85 a3 01 00 00 e8 6d a0 ff f7 49 8d 7e 12 48 89 f8 48 c1 e8 03 &lt;42&gt; 0f b6 04 28 84 c0 0f 85 4b 02 00 00 41 0f b7 5e 12 49 8d 7e 14
RSP: 0018:ffffc9000b947c98 EFLAGS: 00010202
RAX: 0000000000000002 RBX: ffff8880252ddf98 RCX: ffff888079478000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000012
RBP: 0000000000000001 R08: ffffffff8993e18d R09: 1ffffffff1fef385
R10: dffffc0000000000 R11: fffffbfff1fef386 R12: ffff8880252ddac0
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f24e45b96c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcced5f7b8 CR3: 00000000241be000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __sctp_hash_endpoint net/sctp/input.c:762 [inline]
 sctp_hash_endpoint+0x52a/0x600 net/sctp/input.c:790
 sctp_listen_start net/sctp/socket.c:8570 [inline]
 sctp_inet_listen+0x767/0xa20 net/sctp/socket.c:8625
 __sys_listen_socket net/socket.c:1883 [inline]
 __sys_listen+0x1b7/0x230 net/socket.c:1894
 __do_sys_listen net/socket.c:1902 [inline]
 __se_sys_listen net/socket.c:1900 [inline]
 __x64_sys_listen+0x5a/0x70 net/socket.c:1900
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f24e46039b9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f24e45b9228 EFLAGS: 00000246 ORIG_RAX: 0000000000000032
RAX: ffffffffffffffda RBX: 00007f24e468e428 RCX: 00007f24e46039b9
RDX: 00007f24e46039b9 RSI: 0000000000000003 RDI: 0000000000000004
RBP: 00007f24e468e420 R08: 00007f24e45b96c0 R09: 00007f24e45b96c0
R10: 00007f24e45b96c0 R11: 0000000000000246 R12: 00007f24e468e42c
R13:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229810">SUSE bug 1229810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix shift-out-of-bounds in dbDiscardAG

When searching for the next smaller log2 block, BLKSTOL2() returned 0,
causing shift exponent -1 to be negative.

This patch fixes the issue by exiting the loop directly when negative
shift is found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229793">SUSE bug 1229793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix null ptr deref in dtInsertEntry

[syzbot reported]
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 5061 Comm: syz-executor404 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713
...
[Analyze]
In dtInsertEntry(), when the pointer h has the same value as p, after writing
name in UniStrncpy_to_le(), p-&gt;header.flag will be cleared. This will cause the
previously true judgment "p-&gt;header.flag &amp; BT-LEAF" to change to no after writing
the name operation, this leads to entering an incorrect branch and accessing the
uninitialized object ih when judging this condition for the second time.

[Fix]
After got the page, check freelist first, if freelist == 0 then exit dtInsert()
and return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229820">SUSE bug 1229820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945199" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945182" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44944</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: use helper function to calculate expect ID

Delete expectation path is missing a call to the nf_expect_get_id()
helper function to calculate the expectation ID, otherwise LSB of the
expectation object address is leaked to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229899">SUSE bug 1229899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44946</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kcm: Serialise kcm_sendmsg() for the same socket.

syzkaller reported UAF in kcm_release(). [0]

The scenario is

  1. Thread A builds a skb with MSG_MORE and sets kcm-&gt;seq_skb.

  2. Thread A resumes building skb from kcm-&gt;seq_skb but is blocked
     by sk_stream_wait_memory()

  3. Thread B calls sendmsg() concurrently, finishes building kcm-&gt;seq_skb
     and puts the skb to the write queue

  4. Thread A faces an error and finally frees skb that is already in the
     write queue

  5. kcm_release() does double-free the skb in the write queue

When a thread is building a MSG_MORE skb, another thread must not touch it.

Let's add a per-sk mutex and serialise kcm_sendmsg().

[0]:
BUG: KASAN: slab-use-after-free in __skb_unlink include/linux/skbuff.h:2366 [inline]
BUG: KASAN: slab-use-after-free in __skb_dequeue include/linux/skbuff.h:2385 [inline]
BUG: KASAN: slab-use-after-free in __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline]
BUG: KASAN: slab-use-after-free in __skb_queue_purge include/linux/skbuff.h:3181 [inline]
BUG: KASAN: slab-use-after-free in kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691
Read of size 8 at addr ffff0000ced0fc80 by task syz-executor329/6167

CPU: 1 PID: 6167 Comm: syz-executor329 Tainted: G    B              6.8.0-rc5-syzkaller-g9abbc24128bc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x178/0x518 mm/kasan/report.c:488
 kasan_report+0xd8/0x138 mm/kasan/report.c:601
 __asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381
 __skb_unlink include/linux/skbuff.h:2366 [inline]
 __skb_dequeue include/linux/skbuff.h:2385 [inline]
 __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline]
 __skb_queue_purge include/linux/skbuff.h:3181 [inline]
 kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691
 __sock_release net/socket.c:659 [inline]
 sock_close+0xa4/0x1e8 net/socket.c:1421
 __fput+0x30c/0x738 fs/file_table.c:376
 ____fput+0x20/0x30 fs/file_table.c:404
 task_work_run+0x230/0x2e0 kernel/task_work.c:180
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0x618/0x1f64 kernel/exit.c:871
 do_group_exit+0x194/0x22c kernel/exit.c:1020
 get_signal+0x1500/0x15ec kernel/signal.c:2893
 do_signal+0x23c/0x3b44 arch/arm64/kernel/signal.c:1249
 do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148
 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline]
 exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline]
 el0_svc+0xac/0x168 arch/arm64/kernel/entry-common.c:713
 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598

Allocated by task 6166:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_alloc_info+0x70/0x84 mm/kasan/generic.c:626
 unpoison_slab_object mm/kasan/common.c:314 [inline]
 __kasan_slab_alloc+0x74/0x8c mm/kasan/common.c:340
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slub.c:3813 [inline]
 slab_alloc_node mm/slub.c:3860 [inline]
 kmem_cache_alloc_node+0x204/0x4c0 mm/slub.c:3903
 __alloc_skb+0x19c/0x3d8 net/core/skbuff.c:641
 alloc_skb include/linux/skbuff.h:1296 [inline]
 kcm_sendmsg+0x1d3c/0x2124 net/kcm/kcmsock.c:783
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 sock_sendmsg+0x220/0x2c0 net/socket.c:768
 splice_to_socket+0x7cc/0xd58 fs/splice.c:889
 do_splice_from fs/splice.c:941 [inline]
 direct_splice_actor+0xec/0x1d8 fs/splice.c:1164
 splice_direct_to_actor+0x438/0xa0c fs/splice.c:1108
 do_splice_direct_actor 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230016">SUSE bug 1230016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44947</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: Initialize beyond-EOF page contents before setting uptodate

fuse_notify_store(), unlike fuse_do_readpage(), does not enable page
zeroing (because it can be used to change partial page contents).

So fuse_notify_store() must be more careful to fully initialize page
contents (including parts of the page that are beyond end-of-file)
before marking the page uptodate.

The current code can leave beyond-EOF page contents uninitialized, which
makes these uninitialized page contents visible to userspace via mmap().

This is an information leak, but only affects systems which do not
enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the
corresponding kernel command line parameter).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230098">SUSE bug 1230098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44948</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mtrr: Check if fixed MTRRs exist before saving them

MTRRs have an obsolete fixed variant for fine grained caching control
of the 640K-1MB region that uses separate MSRs. This fixed variant has
a separate capability bit in the MTRR capability MSR.

So far all x86 CPUs which support MTRR have this separate bit set, so it
went unnoticed that mtrr_save_state() does not check the capability bit
before accessing the fixed MTRR MSRs.

Though on a CPU that does not support the fixed MTRR capability this
results in a #GP.  The #GP itself is harmless because the RDMSR fault is
handled gracefully, but results in a WARN_ON().

Add the missing capability check to prevent this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230174">SUSE bug 1230174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44950</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: fix invalid FIFO access with special register set

When enabling access to the special register set, Receiver time-out and
RHR interrupts can happen. In this case, the IRQ handler will try to read
from the FIFO thru the RHR register at address 0x00, but address 0x00 is
mapped to DLL register, resulting in erroneous FIFO reading.

Call graph example:
    sc16is7xx_startup(): entry
    sc16is7xx_ms_proc(): entry
    sc16is7xx_set_termios(): entry
    sc16is7xx_set_baud(): DLH/DLL = $009C --&gt; access special register set
    sc16is7xx_port_irq() entry            --&gt; IIR is 0x0C
    sc16is7xx_handle_rx() entry
    sc16is7xx_fifo_read(): --&gt; unable to access FIFO (RHR) because it is
                               mapped to DLL (LCR=LCR_CONF_MODE_A)
    sc16is7xx_set_baud(): exit --&gt; Restore access to general register set

Fix the problem by claiming the efr_lock mutex when accessing the Special
register set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230180">SUSE bug 1230180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44952</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230178">SUSE bug 1230178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44954</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: line6: Fix racy access to midibuf

There can be concurrent accesses to line6 midibuf from both the URB
completion callback and the rawmidi API access.  This could be a cause
of KMSAN warning triggered by syzkaller below (so put as reported-by
here).

This patch protects the midibuf call of the former code path with a
spinlock for avoiding the possible races.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230176">SUSE bug 1230176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44958</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/smt: Fix unbalance sched_smt_present dec/inc

I got the following warn report while doing stress test:

jump label: negative count!
WARNING: CPU: 3 PID: 38 at kernel/jump_label.c:263 static_key_slow_try_dec+0x9d/0xb0
Call Trace:
 &lt;TASK&gt;
 __static_key_slow_dec_cpuslocked+0x16/0x70
 sched_cpu_deactivate+0x26e/0x2a0
 cpuhp_invoke_callback+0x3ad/0x10d0
 cpuhp_thread_fun+0x3f5/0x680
 smpboot_thread_fn+0x56d/0x8d0
 kthread+0x309/0x400
 ret_from_fork+0x41/0x70
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Because when cpuset_cpu_inactive() fails in sched_cpu_deactivate(),
the cpu offline failed, but sched_smt_present is decremented before
calling sched_cpu_deactivate(), it leads to unbalanced dec/inc, so
fix it by incrementing sched_smt_present in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230179">SUSE bug 1230179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44964</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leaks and crashes while performing a soft reset

The second tagged commit introduced a UAF, as it removed restoring
q_vector-&gt;vport pointers after reinitializating the structures.
This is due to that all queue allocation functions are performed here
with the new temporary vport structure and those functions rewrite
the backpointers to the vport. Then, this new struct is freed and
the pointers start leading to nowhere.

But generally speaking, the current logic is very fragile. It claims
to be more reliable when the system is low on memory, but in fact, it
consumes two times more memory as at the moment of running this
function, there are two vports allocated with their queues and vectors.
Moreover, it claims to prevent the driver from running into "bad state",
but in fact, any error during the rebuild leaves the old vport in the
partially allocated state.
Finally, if the interface is down when the function is called, it always
allocates a new queue set, but when the user decides to enable the
interface later on, vport_open() allocates them once again, IOW there's
a clear memory leak here.

Just don't allocate a new queue set when performing a reset, that solves
crashes and memory leaks. Readd the old queue number and reopen the
interface on rollback - that solves limbo states when the device is left
disabled and/or without HW queues enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mgag200: Bind I2C lifetime to DRM device

Managed cleanup with devm_add_action_or_reset() will release the I2C
adapter when the underlying Linux device goes away. But the connector
still refers to it, so this cleanup leaves behind a stale pointer
in struct drm_connector.ddc.

Bind the lifetime of the I2C adapter to the connector's lifetime by
using DRM's managed release. When the DRM device goes away (after
the Linux device) DRM will first clean up the connector and then
clean up the I2C adapter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230224">SUSE bug 1230224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Prevent release of buffer in I/O

When a task waiting for completion of a Store Data operation is
interrupted, an attempt is made to halt this operation. If this attempt
fails due to a hardware or firmware problem, there is a chance that the
SCLP facility might store data into buffers referenced by the original
operation at a later time.

Handle this situation by not releasing the referenced data buffers if
the halt attempt fails. For current use cases, this might result in a
leak of few pages of memory in case of a rare hardware/firmware
malfunction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230200">SUSE bug 1230200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44970</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink

When all the strides in a WQE have been consumed, the WQE is unlinked
from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible
to receive CQEs with 0 consumed strides for the same WQE even after the
WQE is fully consumed and unlinked. This triggers an additional unlink
for the same wqe which corrupts the linked list.

Fix this scenario by accepting 0 sized consumed strides without
unlinking the WQE again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230209">SUSE bug 1230209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44971</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register()

bcm_sf2_mdio_register() calls of_phy_find_device() and then
phy_device_remove() in a loop to remove existing PHY devices.
of_phy_find_device() eventually calls bus_find_device(), which calls
get_device() on the returned struct device * to increment the refcount.
The current implementation does not decrement the refcount, which causes
memory leak.

This commit adds the missing phy_device_free() call to decrement the
refcount via put_device() to balance the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230211">SUSE bug 1230211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44972</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44972" ref_url="https://www.suse.com/security/cve/CVE-2024-44972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not clear page dirty inside extent_write_locked_range()

[BUG]
For subpage + zoned case, the following workload can lead to rsv data
leak at unmount time:

  # mkfs.btrfs -f -s 4k $dev
  # mount $dev $mnt
  # fsstress -w -n 8 -d $mnt -s 1709539240
  0/0: fiemap - no filename
  0/1: copyrange read - no filename
  0/2: write - no filename
  0/3: rename - no source filename
  0/4: creat f0 x:0 0 0
  0/4: creat add id=0,parent=-1
  0/5: writev f0[259 1 0 0 0 0] [778052,113,965] 0
  0/6: ioctl(FIEMAP) f0[259 1 0 0 224 887097] [1294220,2291618343991484791,0x10000] -1
  0/7: dwrite - xfsctl(XFS_IOC_DIOINFO) f0[259 1 0 0 224 887097] return 25, fallback to stat()
  0/7: dwrite f0[259 1 0 0 224 887097] [696320,102400] 0
  # umount $mnt

The dmesg includes the following rsv leak detection warning (all call
trace skipped):

  ------------[ cut here ]------------
  WARNING: CPU: 2 PID: 4528 at fs/btrfs/inode.c:8653 btrfs_destroy_inode+0x1e0/0x200 [btrfs]
  ---[ end trace 0000000000000000 ]---
  ------------[ cut here ]------------
  WARNING: CPU: 2 PID: 4528 at fs/btrfs/inode.c:8654 btrfs_destroy_inode+0x1a8/0x200 [btrfs]
  ---[ end trace 0000000000000000 ]---
  ------------[ cut here ]------------
  WARNING: CPU: 2 PID: 4528 at fs/btrfs/inode.c:8660 btrfs_destroy_inode+0x1a0/0x200 [btrfs]
  ---[ end trace 0000000000000000 ]---
  BTRFS info (device sda): last unmount of filesystem 1b4abba9-de34-4f07-9e7f-157cf12a18d6
  ------------[ cut here ]------------
  WARNING: CPU: 3 PID: 4528 at fs/btrfs/block-group.c:4434 btrfs_free_block_groups+0x338/0x500 [btrfs]
  ---[ end trace 0000000000000000 ]---
  BTRFS info (device sda): space_info DATA has 268218368 free, is not full
  BTRFS info (device sda): space_info total=268435456, used=204800, pinned=0, reserved=0, may_use=12288, readonly=0 zone_unusable=0
  BTRFS info (device sda): global_block_rsv: size 0 reserved 0
  BTRFS info (device sda): trans_block_rsv: size 0 reserved 0
  BTRFS info (device sda): chunk_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_refs_rsv: size 0 reserved 0
  ------------[ cut here ]------------
  WARNING: CPU: 3 PID: 4528 at fs/btrfs/block-group.c:4434 btrfs_free_block_groups+0x338/0x500 [btrfs]
  ---[ end trace 0000000000000000 ]---
  BTRFS info (device sda): space_info METADATA has 267796480 free, is not full
  BTRFS info (device sda): space_info total=268435456, used=131072, pinned=0, reserved=0, may_use=262144, readonly=0 zone_unusable=245760
  BTRFS info (device sda): global_block_rsv: size 0 reserved 0
  BTRFS info (device sda): trans_block_rsv: size 0 reserved 0
  BTRFS info (device sda): chunk_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_refs_rsv: size 0 reserved 0

Above $dev is a tcmu-runner emulated zoned HDD, which has a max zone
append size of 64K, and the system has 64K page size.

[CAUSE]
I have added several trace_printk() to show the events (header skipped):

  &gt; btrfs_dirty_pages: r/i=5/259 dirty start=774144 len=114688
  &gt; btrfs_dirty_pages: r/i=5/259 dirty part of page=720896 off_in_page=53248 len_in_page=12288
  &gt; btrfs_dirty_pages: r/i=5/259 dirty part of page=786432 off_in_page=0 len_in_page=65536
  &gt; btrfs_dirty_pages: r/i=5/259 dirty part of page=851968 off_in_page=0 len_in_page=36864

The above lines show our buffered write has dirtied 3 pages of inode
259 of root 5:

  704K             768K              832K              896K
  I           |////I/////////////////I///////////|     I
              756K                               868K

  |///| is the dirtied range using subpage bitmaps. and 'I' is the page
  boundary.

  Meanwhile all three pages (704K, 768K, 832K) have their PageDirty
  flag set.

  &gt; btrfs_direct_write: r/i=5/259 start dio filepos=696320 len=102400

Then direct IO writ
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44972/">CVE-2024-44972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44972">CVE-2024-44972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230212">SUSE bug 1230212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44977</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Validate TA binary size

Add TA binary size validation to avoid OOB write.

(cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230217">SUSE bug 1230217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails

If the dpu_format_populate_layout() fails, then FB is prepared, but not
cleaned up. This ends up leaking the pin_count on the GEM object and
causes a splat during DRM file closure:

msm_obj-&gt;pin_count
WARNING: CPU: 2 PID: 569 at drivers/gpu/drm/msm/msm_gem.c:121 update_lru_locked+0xc4/0xcc
[...]
Call trace:
 update_lru_locked+0xc4/0xcc
 put_pages+0xac/0x100
 msm_gem_free_object+0x138/0x180
 drm_gem_object_free+0x1c/0x30
 drm_gem_object_handle_put_unlocked+0x108/0x10c
 drm_gem_object_release_handle+0x58/0x70
 idr_for_each+0x68/0xec
 drm_gem_release+0x28/0x40
 drm_file_free+0x174/0x234
 drm_release+0xb0/0x160
 __fput+0xc0/0x2c8
 __fput_sync+0x50/0x5c
 __arm64_sys_close+0x38/0x7c
 invoke_syscall+0x48/0x118
 el0_svc_common.constprop.0+0x40/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x4c/0x120
 el0t_64_sync_handler+0x100/0x12c
 el0t_64_sync+0x190/0x194
irq event stamp: 129818
hardirqs last  enabled at (129817): [&lt;ffffa5f6d953fcc0&gt;] console_unlock+0x118/0x124
hardirqs last disabled at (129818): [&lt;ffffa5f6da7dcf04&gt;] el1_dbg+0x24/0x8c
softirqs last  enabled at (129808): [&lt;ffffa5f6d94afc18&gt;] handle_softirqs+0x4c8/0x4e8
softirqs last disabled at (129785): [&lt;ffffa5f6d94105e4&gt;] __do_softirq+0x14/0x20

Patchwork: https://patchwork.freedesktop.org/patch/600714/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230204">SUSE bug 1230204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44986</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible UAF in ip6_finish_output2()

If skb_expand_head() returns NULL, skb has been freed
and associated dst/idev could also have been freed.

We need to hold rcu_read_lock() to make sure the dst and
associated idev are alive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230230">SUSE bug 1230230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44987</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent UAF in ip6_send_skb()

syzbot reported an UAF in ip6_send_skb() [1]

After ip6_local_out() has returned, we no longer can safely
dereference rt, unless we hold rcu_read_lock().

A similar issue has been fixed in commit
a688caa34beb ("ipv6: take rcu lock in rawv6_send_hdrinc()")

Another potential issue in ip6_finish_output2() is handled in a
separate patch.

[1]
 BUG: KASAN: slab-use-after-free in ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964
Read of size 8 at addr ffff88806dde4858 by task syz.1.380/6530

CPU: 1 UID: 0 PID: 6530 Comm: syz.1.380 Not tainted 6.11.0-rc3-syzkaller-00306-gdf6cbc62cc9b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:93 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964
  rawv6_push_pending_frames+0x75c/0x9e0 net/ipv6/raw.c:588
  rawv6_sendmsg+0x19c7/0x23c0 net/ipv6/raw.c:926
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  sock_write_iter+0x2dd/0x400 net/socket.c:1160
 do_iter_readv_writev+0x60a/0x890
  vfs_writev+0x37c/0xbb0 fs/read_write.c:971
  do_writev+0x1b1/0x350 fs/read_write.c:1018
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f936bf79e79
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f936cd7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 00007f936c115f80 RCX: 00007f936bf79e79
RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000004
RBP: 00007f936bfe7916 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f936c115f80 R15: 00007fff2860a7a8
 &lt;/TASK&gt;

Allocated by task 6530:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  unpoison_slab_object mm/kasan/common.c:312 [inline]
  __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338
  kasan_slab_alloc include/linux/kasan.h:201 [inline]
  slab_post_alloc_hook mm/slub.c:3988 [inline]
  slab_alloc_node mm/slub.c:4037 [inline]
  kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4044
  dst_alloc+0x12b/0x190 net/core/dst.c:89
  ip6_blackhole_route+0x59/0x340 net/ipv6/route.c:2670
  make_blackhole net/xfrm/xfrm_policy.c:3120 [inline]
  xfrm_lookup_route+0xd1/0x1c0 net/xfrm/xfrm_policy.c:3313
  ip6_dst_lookup_flow+0x13e/0x180 net/ipv6/ip6_output.c:1257
  rawv6_sendmsg+0x1283/0x23c0 net/ipv6/raw.c:898
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
  ___sys_sendmsg net/socket.c:2651 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 45:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
  poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
  __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
  kasan_slab_free include/linux/kasan.h:184 [inline]
  slab_free_hook mm/slub.c:2252 [inline]
  slab_free mm/slub.c:4473 [inline]
  kmem_cache_free+0x145/0x350 mm/slub.c:4548
  dst_destroy+0x2ac/0x460 net/core/dst.c:124
  rcu_do_batch kernel/rcu/tree.c:2569 [inline]
  rcu_core+0xafd/0x1830 kernel/rcu/tree.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44988</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: Fix out-of-bound access

If an ATU violation was caused by a CPU Load operation, the SPID could
be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230192">SUSE bug 1230192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix xfrm real_dev null pointer dereference

We shouldn't set real_dev to NULL because packets can be in transit and
xfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume
real_dev is set.

 Example trace:
 kernel: BUG: unable to handle page fault for address: 0000000000001030
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: #PF: supervisor write access in kernel mode
 kernel: #PF: error_code(0x0002) - not-present page
 kernel: PGD 0 P4D 0
 kernel: Oops: 0002 [#1] PREEMPT SMP
 kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12
 kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
 kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 &lt;83&gt; 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:
 kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60
 kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00
 kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014
 kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000
 kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000
 kernel: FS:  00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die+0x1f/0x60
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ? page_fault_oops+0x142/0x4c0
 kernel:  ? do_user_addr_fault+0x65/0x670
 kernel:  ? kvm_read_and_reset_apf_flags+0x3b/0x50
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel:  ? exc_page_fault+0x7b/0x180
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? nsim_bpf_uninit+0x50/0x50 [netdevsim]
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel:  bond_ipsec_offload_ok+0x7b/0x90 [bonding]
 kernel:  xfrm_output+0x61/0x3b0
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ip_push_pending_frames+0x56/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230193">SUSE bug 1230193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44990</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix null pointer deref in bond_ipsec_offload_ok

We must check if there is an active slave before dereferencing the pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230194">SUSE bug 1230194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44995" ref_url="https://www.suse.com/security/cve/CVE-2024-44995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix a deadlock problem when config TC during resetting

When config TC during the reset process, may cause a deadlock, the flow is
as below:
                             pf reset start
                                 |
                                 ▼
                              ......
setup tc                         |
    |                            ▼
    ▼                      DOWN: napi_disable()
napi_disable()(skip)             |
    |                            |
    ▼                            ▼
  ......                      ......
    |                            |
    ▼                            |
napi_enable()                    |
                                 ▼
                           UINIT: netif_napi_del()
                                 |
                                 ▼
                              ......
                                 |
                                 ▼
                           INIT: netif_napi_add()
                                 |
                                 ▼
                              ......                 global reset start
                                 |                      |
                                 ▼                      ▼
                           UP: napi_enable()(skip)    ......
                                 |                      |
                                 ▼                      ▼
                              ......                 napi_disable()

In reset process, the driver will DOWN the port and then UINIT, in this
case, the setup tc process will UP the port before UINIT, so cause the
problem. Adds a DOWN process in UINIT to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44995/">CVE-2024-44995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44995">CVE-2024-44995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230231">SUSE bug 1230231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44998</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: idt77252: prevent use after free in dequeue_rx()

We can't dereference "skb" after calling vcc-&gt;push() because the skb
is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230171">SUSE bug 1230171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44999</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: pull network headers in gtp_dev_xmit()

syzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1]

We must make sure the IPv4 or Ipv6 header is pulled in skb-&gt;head
before accessing fields in them.

Use pskb_inet_may_pull() to fix this issue.

[1]
BUG: KMSAN: uninit-value in ipv6_pdp_find drivers/net/gtp.c:220 [inline]
 BUG: KMSAN: uninit-value in gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]
 BUG: KMSAN: uninit-value in gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281
  ipv6_pdp_find drivers/net/gtp.c:220 [inline]
  gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]
  gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281
  __netdev_start_xmit include/linux/netdevice.h:4913 [inline]
  netdev_start_xmit include/linux/netdevice.h:4922 [inline]
  xmit_one net/core/dev.c:3580 [inline]
  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3596
  __dev_queue_xmit+0x358c/0x5610 net/core/dev.c:4423
  dev_queue_xmit include/linux/netdevice.h:3105 [inline]
  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3145 [inline]
  packet_sendmsg+0x90e3/0xa3a0 net/packet/af_packet.c:3177
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2204
  __do_sys_sendto net/socket.c:2216 [inline]
  __se_sys_sendto net/socket.c:2212 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212
  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3994 [inline]
  slab_alloc_node mm/slub.c:4037 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4080
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:583
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:674
  alloc_skb include/linux/skbuff.h:1320 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6526
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2815
  packet_alloc_skb net/packet/af_packet.c:2994 [inline]
  packet_snd net/packet/af_packet.c:3088 [inline]
  packet_sendmsg+0x749c/0xa3a0 net/packet/af_packet.c:3177
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2204
  __do_sys_sendto net/socket.c:2216 [inline]
  __se_sys_sendto net/socket.c:2212 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212
  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 7115 Comm: syz.1.515 Not tainted 6.11.0-rc1-syzkaller-00043-g94ede2a3e913 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230233">SUSE bug 1230233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/netfs/fscache_cookie: add missing "n_accesses" check

This fixes a NULL pointer dereference bug due to a data race which
looks like this:

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 33 PID: 16573 Comm: kworker/u97:799 Not tainted 6.8.7-cm4all1-hp+ #43
  Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 10/17/2018
  Workqueue: events_unbound netfs_rreq_write_to_cache_work
  RIP: 0010:cachefiles_prepare_write+0x30/0xa0
  Code: 57 41 56 45 89 ce 41 55 49 89 cd 41 54 49 89 d4 55 53 48 89 fb 48 83 ec 08 48 8b 47 08 48 83 7f 10 00 48 89 34 24 48 8b 68 20 &lt;48&gt; 8b 45 08 4c 8b 38 74 45 49 8b 7f 50 e8 4e a9 b0 ff 48 8b 73 10
  RSP: 0018:ffffb4e78113bde0 EFLAGS: 00010286
  RAX: ffff976126be6d10 RBX: ffff97615cdb8438 RCX: 0000000000020000
  RDX: ffff97605e6c4c68 RSI: ffff97605e6c4c60 RDI: ffff97615cdb8438
  RBP: 0000000000000000 R08: 0000000000278333 R09: 0000000000000001
  R10: ffff97605e6c4600 R11: 0000000000000001 R12: ffff97605e6c4c68
  R13: 0000000000020000 R14: 0000000000000001 R15: ffff976064fe2c00
  FS:  0000000000000000(0000) GS:ffff9776dfd40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000008 CR3: 000000005942c002 CR4: 00000000001706f0
  Call Trace:
   &lt;TASK&gt;
   ? __die+0x1f/0x70
   ? page_fault_oops+0x15d/0x440
   ? search_module_extables+0xe/0x40
   ? fixup_exception+0x22/0x2f0
   ? exc_page_fault+0x5f/0x100
   ? asm_exc_page_fault+0x22/0x30
   ? cachefiles_prepare_write+0x30/0xa0
   netfs_rreq_write_to_cache_work+0x135/0x2e0
   process_one_work+0x137/0x2c0
   worker_thread+0x2e9/0x400
   ? __pfx_worker_thread+0x10/0x10
   kthread+0xcc/0x100
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x30/0x50
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1b/0x30
   &lt;/TASK&gt;
  Modules linked in:
  CR2: 0000000000000008
  ---[ end trace 0000000000000000 ]---

This happened because fscache_cookie_state_machine() was slow and was
still running while another process invoked fscache_unuse_cookie();
this led to a fscache_cookie_lru_do_one() call, setting the
FSCACHE_COOKIE_DO_LRU_DISCARD flag, which was picked up by
fscache_cookie_state_machine(), withdrawing the cookie via
cachefiles_withdraw_cookie(), clearing cookie-&gt;cache_priv.

At the same time, yet another process invoked
cachefiles_prepare_write(), which found a NULL pointer in this code
line:

  struct cachefiles_object *object = cachefiles_cres_object(cres);

The next line crashes, obviously:

  struct cachefiles_cache *cache = object-&gt;volume-&gt;cache;

During cachefiles_prepare_write(), the "n_accesses" counter is
non-zero (via fscache_begin_operation()).  The cookie must not be
withdrawn until it drops to zero.

The counter is checked by fscache_cookie_state_machine() before
switching to FSCACHE_COOKIE_STATE_RELINQUISHING and
FSCACHE_COOKIE_STATE_WITHDRAWING (in "case
FSCACHE_COOKIE_STATE_FAILED"), but not for
FSCACHE_COOKIE_STATE_LRU_DISCARDING ("case
FSCACHE_COOKIE_STATE_ACTIVE").

This patch adds the missing check.  With a non-zero access counter,
the function returns and the next fscache_end_cookie_access() call
will queue another fscache_cookie_state_machine() call to handle the
still-pending FSCACHE_COOKIE_DO_LRU_DISCARD.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230170">SUSE bug 1230170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45001</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix RX buf alloc_size alignment and atomic op panic

The MANA driver's RX buffer alloc_size is passed into napi_build_skb() to
create SKB. skb_shinfo(skb) is located at the end of skb, and its alignment
is affected by the alloc_size passed into napi_build_skb(). The size needs
to be aligned properly for better performance and atomic operations.
Otherwise, on ARM64 CPU, for certain MTU settings like 4000, atomic
operations may panic on the skb_shinfo(skb)-&gt;dataref due to alignment fault.

To fix this bug, add proper alignment to the alloc_size calculation.

Sample panic info:
[  253.298819] Unable to handle kernel paging request at virtual address ffff000129ba5cce
[  253.300900] Mem abort info:
[  253.301760]   ESR = 0x0000000096000021
[  253.302825]   EC = 0x25: DABT (current EL), IL = 32 bits
[  253.304268]   SET = 0, FnV = 0
[  253.305172]   EA = 0, S1PTW = 0
[  253.306103]   FSC = 0x21: alignment fault
Call trace:
 __skb_clone+0xfc/0x198
 skb_clone+0x78/0xe0
 raw6_local_deliver+0xfc/0x228
 ip6_protocol_deliver_rcu+0x80/0x500
 ip6_input_finish+0x48/0x80
 ip6_input+0x48/0xc0
 ip6_sublist_rcv_finish+0x50/0x78
 ip6_sublist_rcv+0x1cc/0x2b8
 ipv6_list_rcv+0x100/0x150
 __netif_receive_skb_list_core+0x180/0x220
 netif_receive_skb_list_internal+0x198/0x2a8
 __napi_poll+0x138/0x250
 net_rx_action+0x148/0x330
 handle_softirqs+0x12c/0x3a0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230244">SUSE bug 1230244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45003</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfs: Don't evict inode under the inode lru traversing context

The inode reclaiming process(See function prune_icache_sb) collects all
reclaimable inodes and mark them with I_FREEING flag at first, at that
time, other processes will be stuck if they try getting these inodes
(See function find_inode_fast), then the reclaiming process destroy the
inodes by function dispose_list(). Some filesystems(eg. ext4 with
ea_inode feature, ubifs with xattr) may do inode lookup in the inode
evicting callback function, if the inode lookup is operated under the
inode lru traversing context, deadlock problems may happen.

Case 1: In function ext4_evict_inode(), the ea inode lookup could happen
        if ea_inode feature is enabled, the lookup process will be stuck
	under the evicting context like this:

 1. File A has inode i_reg and an ea inode i_ea
 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru-&gt;i_ea
 3. Then, following three processes running like this:

    PA                              PB
 echo 2 &gt; /proc/sys/vm/drop_caches
  shrink_slab
   prune_dcache_sb
   // i_reg is added into lru, lru-&gt;i_ea-&gt;i_reg
   prune_icache_sb
    list_lru_walk_one
     inode_lru_isolate
      i_ea-&gt;i_state |= I_FREEING // set inode state
     inode_lru_isolate
      __iget(i_reg)
      spin_unlock(&amp;i_reg-&gt;i_lock)
      spin_unlock(lru_lock)
                                     rm file A
                                      i_reg-&gt;nlink = 0
      iput(i_reg) // i_reg-&gt;nlink is 0, do evict
       ext4_evict_inode
        ext4_xattr_delete_inode
         ext4_xattr_inode_dec_ref_all
          ext4_xattr_inode_iget
           ext4_iget(i_ea-&gt;i_ino)
            iget_locked
             find_inode_fast
              __wait_on_freeing_inode(i_ea) ----→ AA deadlock
    dispose_list // cannot be executed by prune_icache_sb
     wake_up_bit(&amp;i_ea-&gt;i_state)

Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file
        deleting process holds BASEHD's wbuf-&gt;io_mutex while getting the
	xattr inode, which could race with inode reclaiming process(The
        reclaiming process could try locking BASEHD's wbuf-&gt;io_mutex in
	inode evicting function), then an ABBA deadlock problem would
	happen as following:

 1. File A has inode ia and a xattr(with inode ixa), regular file B has
    inode ib and a xattr.
 2. getfattr(A, xattr_buf) // ixa is added into lru // lru-&gt;ixa
 3. Then, following three processes running like this:

        PA                PB                        PC
                echo 2 &gt; /proc/sys/vm/drop_caches
                 shrink_slab
                  prune_dcache_sb
                  // ib and ia are added into lru, lru-&gt;ixa-&gt;ib-&gt;ia
                  prune_icache_sb
                   list_lru_walk_one
                    inode_lru_isolate
                     ixa-&gt;i_state |= I_FREEING // set inode state
                    inode_lru_isolate
                     __iget(ib)
                     spin_unlock(&amp;ib-&gt;i_lock)
                     spin_unlock(lru_lock)
                                                   rm file B
                                                    ib-&gt;nlink = 0
 rm file A
  iput(ia)
   ubifs_evict_inode(ia)
    ubifs_jnl_delete_inode(ia)
     ubifs_jnl_write_inode(ia)
      make_reservation(BASEHD) // Lock wbuf-&gt;io_mutex
      ubifs_iget(ixa-&gt;i_ino)
       iget_locked
        find_inode_fast
         __wait_on_freeing_inode(ixa)
          |          iput(ib) // ib-&gt;nlink is 0, do evict
          |           ubifs_evict_inode
          |            ubifs_jnl_delete_inode(ib)
          ↓             ubifs_jnl_write_inode
     ABBA deadlock ←-----make_reservation(BASEHD)
                   dispose_list // cannot be executed by prune_icache_sb
                    wake_up_bit(&amp;ixa-&gt;i_state)

Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING
to pin the inode in memory while inode_lru_isolate(
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration

re-enumerating full-speed devices after a failed address device command
can trigger a NULL pointer dereference.

Full-speed devices may need to reconfigure the endpoint 0 Max Packet Size
value during enumeration. Usb core calls usb_ep0_reinit() in this case,
which ends up calling xhci_configure_endpoint().

On Panther point xHC the xhci_configure_endpoint() function will
additionally check and reserve bandwidth in software. Other hosts do
this in hardware

If xHC address device command fails then a new xhci_virt_device structure
is allocated as part of re-enabling the slot, but the bandwidth table
pointers are not set up properly here.
This triggers the NULL pointer dereference the next time usb_ep0_reinit()
is called and xhci_configure_endpoint() tries to check and reserve
bandwidth

[46710.713538] usb 3-1: new full-speed USB device number 5 using xhci_hcd
[46710.713699] usb 3-1: Device not responding to setup address.
[46710.917684] usb 3-1: Device not responding to setup address.
[46711.125536] usb 3-1: device not accepting address 5, error -71
[46711.125594] BUG: kernel NULL pointer dereference, address: 0000000000000008
[46711.125600] #PF: supervisor read access in kernel mode
[46711.125603] #PF: error_code(0x0000) - not-present page
[46711.125606] PGD 0 P4D 0
[46711.125610] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
[46711.125615] CPU: 1 PID: 25760 Comm: kworker/1:2 Not tainted 6.10.3_2 #1
[46711.125620] Hardware name: Gigabyte Technology Co., Ltd.
[46711.125623] Workqueue: usb_hub_wq hub_event [usbcore]
[46711.125668] RIP: 0010:xhci_reserve_bandwidth (drivers/usb/host/xhci.c

Fix this by making sure bandwidth table pointers are set up correctly
after a failed address device command, and additionally by avoiding
checking for bandwidth in cases like this where no actual endpoints are
added or removed, i.e. only context for default control endpoint 0 is
evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230247">SUSE bug 1230247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: xillybus: Don't destroy workqueue from work item running on it

Triggered by a kref decrement, destroy_workqueue() may be called from
within a work item for destroying its own workqueue. This illegal
situation is averted by adding a module-global workqueue for exclusive
use of the offending work item. Other work items continue to be queued
on per-device workqueues to ensure performance.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230175">SUSE bug 1230175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45008" ref_url="https://www.suse.com/security/cve/CVE-2024-45008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: MT - limit max slots

syzbot is reporting too large allocation at input_mt_init_slots(), for
num_slots is supplied from userspace using ioctl(UI_DEV_CREATE).

Since nobody knows possible max slots, this patch chose 1024.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45008/">CVE-2024-45008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230248">SUSE bug 1230248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45011</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: xillybus: Check USB endpoints when probing device

Ensure, as the driver probes the device, that all endpoints that the
driver may attempt to access exist and are of the correct type.

All XillyUSB devices must have a Bulk IN and Bulk OUT endpoint at
address 1. This is verified in xillyusb_setup_base_eps().

On top of that, a XillyUSB device may have additional Bulk OUT
endpoints. The information about these endpoints' addresses is deduced
from a data structure (the IDT) that the driver fetches from the device
while probing it. These endpoints are checked in setup_channels().

A XillyUSB device never has more than one IN endpoint, as all data
towards the host is multiplexed in this single Bulk IN endpoint. This is
why setup_channels() only checks OUT endpoints.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230440">SUSE bug 1230440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45013</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: move stopping keep-alive into nvme_uninit_ctrl()

Commit 4733b65d82bd ("nvme: start keep-alive after admin queue setup")
moves starting keep-alive from nvme_start_ctrl() into
nvme_init_ctrl_finish(), but don't move stopping keep-alive into
nvme_uninit_ctrl(), so keep-alive work can be started and keep pending
after failing to start controller, finally use-after-free is triggered if
nvme host driver is unloaded.

This patch fixes kernel panic when running nvme/004 in case that connection
failure is triggered, by moving stopping keep-alive into nvme_uninit_ctrl().

This way is reasonable because keep-alive is now started in
nvme_init_ctrl_finish().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45015</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()

For cases where the crtc's connectors_changed was set without enable/active
getting toggled , there is an atomic_enable() call followed by an
atomic_disable() but without an atomic_mode_set().

This results in a NULL ptr access for the dpu_encoder_get_drm_fmt() call in
the atomic_enable() as the dpu_encoder's connector was cleared in the
atomic_disable() but not re-assigned as there was no atomic_mode_set() call.

Fix the NULL ptr access by moving the assignment for atomic_enable() and also
use drm_atomic_get_new_connector_for_encoder() to get the connector from
the atomic_state.

Patchwork: https://patchwork.freedesktop.org/patch/606729/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230444">SUSE bug 1230444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45016</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netem: fix return value if duplicate enqueue fails

There is a bug in netem_enqueue() introduced by
commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec")
that can lead to a use-after-free.

This commit made netem_enqueue() always return NET_XMIT_SUCCESS
when a packet is duplicated, which can cause the parent qdisc's q.qlen
to be mistakenly incremented. When this happens qlen_notify() may be
skipped on the parent during destruction, leaving a dangling pointer
for some classful qdiscs like DRR.

There are two ways for the bug happen:

- If the duplicated packet is dropped by rootq-&gt;enqueue() and then
  the original packet is also dropped.
- If rootq-&gt;enqueue() sends the duplicated packet to a different qdisc
  and the original packet is dropped.

In both cases NET_XMIT_SUCCESS is returned even though no packets
are enqueued at the netem qdisc.

The fix is to defer the enqueue of the duplicate packet until after
the original packet has been guaranteed to return NET_XMIT_SUCCESS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230998">SUSE bug 1230998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45018</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: initialise extack before use

Fix missing initialisation of extack in flow offload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230431">SUSE bug 1230431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45020</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a kernel verifier crash in stacksafe()

Daniel Hodges reported a kernel verifier crash when playing with sched-ext.
Further investigation shows that the crash is due to invalid memory access
in stacksafe(). More specifically, it is the following code:

    if (exact != NOT_EXACT &amp;&amp;
        old-&gt;stack[spi].slot_type[i % BPF_REG_SIZE] !=
        cur-&gt;stack[spi].slot_type[i % BPF_REG_SIZE])
            return false;

The 'i' iterates old-&gt;allocated_stack.
If cur-&gt;allocated_stack &lt; old-&gt;allocated_stack the out-of-bound
access will happen.

To fix the issue add 'i &gt;= cur-&gt;allocated_stack' check such that if
the condition is true, stacksafe() should fail. Otherwise,
cur-&gt;stack[spi].slot_type[i % BPF_REG_SIZE] memory access is legal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230433">SUSE bug 1230433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45021</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcg_write_event_control(): fix a user-triggerable oops

we are *not* guaranteed that anything past the terminating NUL
is mapped (let alone initialized with anything sane).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45025</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45025" ref_url="https://www.suse.com/security/cve/CVE-2024-45025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE

copy_fd_bitmaps(new, old, count) is expected to copy the first
count/BITS_PER_LONG bits from old-&gt;full_fds_bits[] and fill
the rest with zeroes.  What it does is copying enough words
(BITS_TO_LONGS(count/BITS_PER_LONG)), then memsets the rest.
That works fine, *if* all bits past the cutoff point are
clear.  Otherwise we are risking garbage from the last word
we'd copied.

For most of the callers that is true - expand_fdtable() has
count equal to old-&gt;max_fds, so there's no open descriptors
past count, let alone fully occupied words in -&gt;open_fds[],
which is what bits in -&gt;full_fds_bits[] correspond to.

The other caller (dup_fd()) passes sane_fdtable_size(old_fdt, max_fds),
which is the smallest multiple of BITS_PER_LONG that covers all
opened descriptors below max_fds.  In the common case (copying on
fork()) max_fds is ~0U, so all opened descriptors will be below
it and we are fine, by the same reasons why the call in expand_fdtable()
is safe.

Unfortunately, there is a case where max_fds is less than that
and where we might, indeed, end up with junk in -&gt;full_fds_bits[] -
close_range(from, to, CLOSE_RANGE_UNSHARE) with
	* descriptor table being currently shared
	* 'to' being above the current capacity of descriptor table
	* 'from' being just under some chunk of opened descriptors.
In that case we end up with observably wrong behaviour - e.g. spawn
a child with CLONE_FILES, get all descriptors in range 0..127 open,
then close_range(64, ~0U, CLOSE_RANGE_UNSHARE) and watch dup(0) ending
up with descriptor #128, despite #64 being observably not open.

The minimally invasive fix would be to deal with that in dup_fd().
If this proves to add measurable overhead, we can go that way, but
let's try to fix copy_fd_bitmaps() first.

* new helper: bitmap_copy_and_expand(to, from, bits_to_copy, size).
* make copy_fd_bitmaps() take the bitmap size in words, rather than
bits; it's 'count' argument is always a multiple of BITS_PER_LONG,
so we are not losing any information, and that way we can use the
same helper for all three bitmaps - compiler will see that count
is a multiple of BITS_PER_LONG for the large ones, so it'll generate
plain memcpy()+memset().

Reproducer added to tools/testing/selftests/core/close_range_test.c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45025/">CVE-2024-45025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230456">SUSE bug 1230456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45026</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix error recovery leading to data corruption on ESE devices

Extent Space Efficient (ESE) or thin provisioned volumes need to be
formatted on demand during usual IO processing.

The dasd_ese_needs_format function checks for error codes that signal
the non existence of a proper track format.

The check for incorrect length is to imprecise since other error cases
leading to transport of insufficient data also have this flag set.
This might lead to data corruption in certain error cases for example
during a storage server warmstart.

Fix by removing the check for incorrect length and replacing by
explicitly checking for invalid track format in transport mode.

Also remove the check for file protected since this is not a valid
ESE handling case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45028</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmc_test: Fix NULL dereference on allocation failure

If the "test-&gt;highmem = alloc_pages()" allocation fails then calling
__free_pages(test-&gt;highmem) will result in a NULL dereference.  Also
change the error code to -ENOMEM instead of returning success.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230450">SUSE bug 1230450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45029</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: tegra: Do not mark ACPI devices as irq safe

On ACPI machines, the tegra i2c module encounters an issue due to a
mutex being called inside a spinlock. This leads to the following bug:

	BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585
	...

	Call trace:
	__might_sleep
	__mutex_lock_common
	mutex_lock_nested
	acpi_subsys_runtime_resume
	rpm_resume
	tegra_i2c_xfer

The problem arises because during __pm_runtime_resume(), the spinlock
&amp;dev-&gt;power.lock is acquired before rpm_resume() is called. Later,
rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on
mutexes, triggering the error.

To address this issue, devices on ACPI are now marked as not IRQ-safe,
considering the dependency of acpi_subsys_runtime_resume() on mutexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230451">SUSE bug 1230451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45310</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036969.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3.

Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual
user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230092">SUSE bug 1230092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942539" comment="runc-1.1.14-150000.70.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45490</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6754" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000045.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6989" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTUXDK3N23TI6WAE5SOEDJKD7NIASPBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAIATV7O5IGNWF5QEG55GA3DNAVFOJWG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WR4SNIPTL3MVBAVRYUOIK4QCPYAXEF3S/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942542" comment="libexpat1-2.4.4-150400.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45491</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6754" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000045.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6989" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8859" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTUXDK3N23TI6WAE5SOEDJKD7NIASPBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAIATV7O5IGNWF5QEG55GA3DNAVFOJWG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WR4SNIPTL3MVBAVRYUOIK4QCPYAXEF3S/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229931">SUSE bug 1229931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942542" comment="libexpat1-2.4.4-150400.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45492</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6754" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000045.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6989" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTUXDK3N23TI6WAE5SOEDJKD7NIASPBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAIATV7O5IGNWF5QEG55GA3DNAVFOJWG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WR4SNIPTL3MVBAVRYUOIK4QCPYAXEF3S/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229932">SUSE bug 1229932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942542" comment="libexpat1-2.4.4-150400.3.22.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45615</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45615" ref_url="https://www.suse.com/security/cve/CVE-2024-45615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. 
The problem is missing  initialization of variables expected to be initialized (as arguments to other functions, etc.).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45615/">CVE-2024-45615 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45615">CVE-2024-45615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230071">SUSE bug 1230071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45616</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45616" ref_url="https://www.suse.com/security/cve/CVE-2024-45616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

The following problems were caused by insufficient control of the response APDU buffer and its length when communicating with the card.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45616/">CVE-2024-45616 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45616">CVE-2024-45616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230072">SUSE bug 1230072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45617</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45617" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45617" ref_url="https://www.suse.com/security/cve/CVE-2024-45617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45617/">CVE-2024-45617 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45617">CVE-2024-45617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230073">SUSE bug 1230073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45618</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45618" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45618" ref_url="https://www.suse.com/security/cve/CVE-2024-45618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in pkcs15-init in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. 

Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45618/">CVE-2024-45618 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45618">CVE-2024-45618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230074">SUSE bug 1230074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45619</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45619" ref_url="https://www.suse.com/security/cve/CVE-2024-45619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45619/">CVE-2024-45619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45619">CVE-2024-45619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230075">SUSE bug 1230075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45620</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45620" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45620" ref_url="https://www.suse.com/security/cve/CVE-2024-45620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the pkcs15-init tool in OpenSC. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45620/">CVE-2024-45620 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45620">CVE-2024-45620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230076">SUSE bug 1230076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45817" ref_url="https://www.suse.com/security/cve/CVE-2024-45817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4E3MDUKJZYGF64AJQVOLAUGC4JH4NTPK/" source="SUSE-SU"/>
    <description>
    In x86's APIC (Advanced Programmable Interrupt Controller) architecture,
error conditions are reported in a status register.  Furthermore, the OS
can opt to receive an interrupt when a new error occurs.

It is possible to configure the error interrupt with an illegal vector,
which generates an error when an error interrupt is raised.

This case causes Xen to recurse through vlapic_error().  The recursion
itself is bounded; errors accumulate in the the status register and only
generate an interrupt when a new status bit becomes set.

However, the lock protecting this state in Xen will try to be taken
recursively, and deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45817/">CVE-2024-45817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45817">CVE-2024-45817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230366">SUSE bug 1230366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202445818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45818</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45818" ref_url="https://www.suse.com/security/cve/CVE-2024-45818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEWRLARXOTVNP23NN77IW3VFLNMEXBMM/" source="SUSE-SU"/>
    <description>
    The hypervisor contains code to accelerate VGA memory accesses for HVM
guests, when the (virtual) VGA is in "standard" mode.  Locking involved
there has an unusual discipline, leaving a lock acquired past the
return from the function that acquired it.  This behavior results in a
problem when emulating an instruction with two memory accesses, both of
which touch VGA memory (plus some further constraints which aren't
relevant here).  When emulating the 2nd access, the lock that is already
being held would be attempted to be re-acquired, resulting in a
deadlock.

This deadlock was already found when the code was first introduced, but
was analysed incorrectly and the fix was incomplete.  Analysis in light
of the new finding cannot find a way to make the existing locking
discipline work.

In staging, this logic has all been removed because it was discovered
to be accidentally disabled since Xen 4.7.  Therefore, we are fixing the
locking problem by backporting the removal of most of the feature.  Note
that even with the feature disabled, the lock would still be acquired
for any accesses to the VGA MMIO region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45818/">CVE-2024-45818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45818">CVE-2024-45818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232622">SUSE bug 1232622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951996" comment="xen-libs-4.17.5_06-150500.3.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45819" ref_url="https://www.suse.com/security/cve/CVE-2024-45819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019907.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEWRLARXOTVNP23NN77IW3VFLNMEXBMM/" source="SUSE-SU"/>
    <description>
    PVH guests have their ACPI tables constructed by the toolstack.  The
construction involves building the tables in local memory, which are
then copied into guest memory.  While actually used parts of the local
memory are filled in correctly, excess space that is being allocated is
left with its prior contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45819/">CVE-2024-45819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45819">CVE-2024-45819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232624">SUSE bug 1232624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951996" comment="xen-libs-4.17.5_06-150500.3.42.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151590" comment="xen-libs is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46673</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: aacraid: Fix double-free on probe failure

aac_probe_one() calls hardware-specific init functions through the
aac_driver_ident::init pointer, all of which eventually call down to
aac_init_adapter().

If aac_init_adapter() fails after allocating memory for aac_dev::queues,
it frees the memory but does not clear that member.

After the hardware-specific init function returns an error,
aac_probe_one() goes down an error path that frees the memory pointed to
by aac_dev::queues, resulting.in a double-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230506">SUSE bug 1230506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46674</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46674" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: st: fix probed platform device ref count on probe error path

The probe function never performs any paltform device allocation, thus
error path "undo_platform_dev_alloc" is entirely bogus.  It drops the
reference count from the platform device being probed.  If error path is
triggered, this will lead to unbalanced device reference counts and
premature release of device resources, thus possible use-after-free when
releasing remaining devm-managed resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230599">SUSE bug 1230599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46675</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: Prevent USB core invalid event buffer address access

This commit addresses an issue where the USB core could access an
invalid event buffer address during runtime suspend, potentially causing
SMMU faults and other memory issues in Exynos platforms. The problem
arises from the following sequence.
        1. In dwc3_gadget_suspend, there is a chance of a timeout when
        moving the USB core to the halt state after clearing the
        run/stop bit by software.
        2. In dwc3_core_exit, the event buffer is cleared regardless of
        the USB core's status, which may lead to an SMMU faults and
        other memory issues. if the USB core tries to access the event
        buffer address.

To prevent this hardware quirk on Exynos platforms, this commit ensures
that the event buffer address is not cleared by software  when the USB
core is active during runtime suspend by checking its status before
clearing the buffer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230533">SUSE bug 1230533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46676</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Add poll mod list filling check

In case of im_protocols value is 1 and tm_protocols value is 0 this
combination successfully passes the check
'if (!im_protocols &amp;&amp; !tm_protocols)' in the nfc_start_poll().
But then after pn533_poll_create_mod_list() call in pn533_start_poll()
poll mod list will remain empty and dev-&gt;poll_mod_count will remain 0
which lead to division by zero.

Normally no im protocol has value 1 in the mask, so this combination is
not expected by driver. But these protocol values actually come from
userspace via Netlink interface (NFC_CMD_START_POLL operation). So a
broken or malicious program may pass a message containing a "bad"
combination of protocol parameter values so that dev-&gt;poll_mod_count
is not incremented inside pn533_poll_create_mod_list(), thus leading
to division by zero.
Call trace looks like:
nfc_genl_start_poll()
  nfc_start_poll()
    -&gt;start_poll()
    pn533_start_poll()

Add poll mod list filling check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230535">SUSE bug 1230535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46677</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: fix a potential NULL pointer dereference

When sockfd_lookup() fails, gtp_encap_enable_socket() returns a
NULL pointer, but its callers only check for error pointers thus miss
the NULL pointer case.

Fix it by returning an error pointer with the error code carried from
sockfd_lookup().

(I found this bug during code inspection.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230549">SUSE bug 1230549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46678</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46678" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: change ipsec_lock from spin lock to mutex

In the cited commit, bond-&gt;ipsec_lock is added to protect ipsec_list,
hence xdo_dev_state_add and xdo_dev_state_delete are called inside
this lock. As ipsec_lock is a spin lock and such xfrmdev ops may sleep,
"scheduling while atomic" will be triggered when changing bond's
active slave.

[  101.055189] BUG: scheduling while atomic: bash/902/0x00000200
[  101.055726] Modules linked in:
[  101.058211] CPU: 3 PID: 902 Comm: bash Not tainted 6.9.0-rc4+ #1
[  101.058760] Hardware name:
[  101.059434] Call Trace:
[  101.059436]  &lt;TASK&gt;
[  101.060873]  dump_stack_lvl+0x51/0x60
[  101.061275]  __schedule_bug+0x4e/0x60
[  101.061682]  __schedule+0x612/0x7c0
[  101.062078]  ? __mod_timer+0x25c/0x370
[  101.062486]  schedule+0x25/0xd0
[  101.062845]  schedule_timeout+0x77/0xf0
[  101.063265]  ? asm_common_interrupt+0x22/0x40
[  101.063724]  ? __bpf_trace_itimer_state+0x10/0x10
[  101.064215]  __wait_for_common+0x87/0x190
[  101.064648]  ? usleep_range_state+0x90/0x90
[  101.065091]  cmd_exec+0x437/0xb20 [mlx5_core]
[  101.065569]  mlx5_cmd_do+0x1e/0x40 [mlx5_core]
[  101.066051]  mlx5_cmd_exec+0x18/0x30 [mlx5_core]
[  101.066552]  mlx5_crypto_create_dek_key+0xea/0x120 [mlx5_core]
[  101.067163]  ? bonding_sysfs_store_option+0x4d/0x80 [bonding]
[  101.067738]  ? kmalloc_trace+0x4d/0x350
[  101.068156]  mlx5_ipsec_create_sa_ctx+0x33/0x100 [mlx5_core]
[  101.068747]  mlx5e_xfrm_add_state+0x47b/0xaa0 [mlx5_core]
[  101.069312]  bond_change_active_slave+0x392/0x900 [bonding]
[  101.069868]  bond_option_active_slave_set+0x1c2/0x240 [bonding]
[  101.070454]  __bond_opt_set+0xa6/0x430 [bonding]
[  101.070935]  __bond_opt_set_notify+0x2f/0x90 [bonding]
[  101.071453]  bond_opt_tryset_rtnl+0x72/0xb0 [bonding]
[  101.071965]  bonding_sysfs_store_option+0x4d/0x80 [bonding]
[  101.072567]  kernfs_fop_write_iter+0x10c/0x1a0
[  101.073033]  vfs_write+0x2d8/0x400
[  101.073416]  ? alloc_fd+0x48/0x180
[  101.073798]  ksys_write+0x5f/0xe0
[  101.074175]  do_syscall_64+0x52/0x110
[  101.074576]  entry_SYSCALL_64_after_hwframe+0x4b/0x53

As bond_ipsec_add_sa_all and bond_ipsec_del_sa_all are only called
from bond_change_active_slave, which requires holding the RTNL lock.
And bond_ipsec_add_sa and bond_ipsec_del_sa are xfrm state
xdo_dev_state_add and xdo_dev_state_delete APIs, which are in user
context. So ipsec_lock doesn't have to be spin lock, change it to
mutex, and thus the above issue can be resolved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230550">SUSE bug 1230550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46679</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: check device is present when getting link settings

A sysfs reader can race with a device reset or removal, attempting to
read device state when the device is not actually present. eg:

     [exception RIP: qed_get_current_link+17]
  #8 [ffffb9e4f2907c48] qede_get_link_ksettings at ffffffffc07a994a [qede]
  #9 [ffffb9e4f2907cd8] __rh_call_get_link_ksettings at ffffffff992b01a3
 #10 [ffffb9e4f2907d38] __ethtool_get_link_ksettings at ffffffff992b04e4
 #11 [ffffb9e4f2907d90] duplex_show at ffffffff99260300
 #12 [ffffb9e4f2907e38] dev_attr_show at ffffffff9905a01c
 #13 [ffffb9e4f2907e50] sysfs_kf_seq_show at ffffffff98e0145b
 #14 [ffffb9e4f2907e68] seq_read at ffffffff98d902e3
 #15 [ffffb9e4f2907ec8] vfs_read at ffffffff98d657d1
 #16 [ffffb9e4f2907f00] ksys_read at ffffffff98d65c3f
 #17 [ffffb9e4f2907f38] do_syscall_64 at ffffffff98a052fb

 crash&gt; struct net_device.state ffff9a9d21336000
    state = 5,

state 5 is __LINK_STATE_START (0b1) and __LINK_STATE_NOCARRIER (0b100).
The device is not present, note lack of __LINK_STATE_PRESENT (0b10).

This is the same sort of panic as observed in commit 4224cfd7fb65
("net-sysfs: add check for netdevice being present to speed_show").

There are many other callers of __ethtool_get_link_ksettings() which
don't have a device presence check.

Move this check into ethtool to protect all callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230556">SUSE bug 1230556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46681</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46681" ref_url="https://www.suse.com/security/cve/CVE-2024-46681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pktgen: use cpus_read_lock() in pg_net_init()

I have seen the WARN_ON(smp_processor_id() != cpu) firing
in pktgen_thread_worker() during tests.

We must use cpus_read_lock()/cpus_read_unlock()
around the for_each_online_cpu(cpu) loop.

While we are at it use WARN_ON_ONCE() to avoid a possible syslog flood.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46681/">CVE-2024-46681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46681">CVE-2024-46681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230558">SUSE bug 1230558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46685</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: single: fix potential NULL dereference in pcs_get_function()

pinmux_generic_get_function() can return NULL and the pointer 'function'
was dereferenced without checking against NULL. Add checking of pointer
'function' in pcs_get_function().

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230515">SUSE bug 1230515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46686</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46686" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req()

This happens when called from SMB2_read() while using rdma
and reaching the rdma_readwrite_threshold.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230517">SUSE bug 1230517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46689</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: cmd-db: Map shared memory as WC, not WB

Linux does not write into cmd-db region. This region of memory is write
protected by XPU. XPU may sometime falsely detect clean cache eviction
as "write" into the write protected region leading to secure interrupt
which causes an endless loop somewhere in Trust Zone.

The only reason it is working right now is because Qualcomm Hypervisor
maps the same region as Non-Cacheable memory in Stage 2 translation
tables. The issue manifests if we want to use another hypervisor (like
Xen or KVM), which does not know anything about those specific mappings.

Changing the mapping of cmd-db memory from MEMREMAP_WB to MEMREMAP_WT/WC
removes dependency on correct mappings in Stage 2 tables. This patch
fixes the issue by updating the mapping to MEMREMAP_WC.

I tested this on SA8155P with Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230524">SUSE bug 1230524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46694</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46694" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: avoid using null object of framebuffer

Instead of using state-&gt;fb-&gt;obj[0] directly, get object from framebuffer
by calling drm_gem_fb_get_obj() and return error code when object is
null to avoid using null object of framebuffer.

(cherry picked from commit 73dd0ad9e5dad53766ea3e631303430116f834b3)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230511">SUSE bug 1230511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46702</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Mark XDomain as unplugged when router is removed

I noticed that when we do discrete host router NVM upgrade and it gets
hot-removed from the PCIe side as a result of NVM firmware authentication,
if there is another host connected with enabled paths we hang in tearing
them down. This is due to fact that the Thunderbolt networking driver
also tries to cleanup the paths and ends up blocking in
tb_disconnect_xdomain_paths() waiting for the domain lock.

However, at this point we already cleaned the paths in tb_stop() so
there is really no need for tb_disconnect_xdomain_paths() to do that
anymore. Furthermore it already checks if the XDomain is unplugged and
bails out early so take advantage of that and mark the XDomain as
unplugged when we remove the parent router.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230589">SUSE bug 1230589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46707</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3

On a system with a GICv3, if a guest hasn't been configured with
GICv3 and that the host is not capable of GICv2 emulation,
a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.

We therefore try to emulate the SGI access, only to hit a NULL
pointer as no private interrupt is allocated (no GIC, remember?).

The obvious fix is to give the guest what it deserves, in the
shape of a UNDEF exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230582">SUSE bug 1230582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46714</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip wbscl_set_scaler_filter if filter is null

Callers can pass null in filter (i.e. from returned from the function
wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is
not the case.

This fixes 4 NULL_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230699">SUSE bug 1230699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46715</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver: iio: add missing checks on iio_info's callback access

Some callbacks from iio_info structure are accessed without any check, so
if a driver doesn't implement them trying to access the corresponding
sysfs entries produce a kernel oops such as:

[ 2203.527791] Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute
[...]
[ 2203.783416] Call trace:
[ 2203.783429]  iio_read_channel_info_avail from dev_attr_show+0x18/0x48
[ 2203.789807]  dev_attr_show from sysfs_kf_seq_show+0x90/0x120
[ 2203.794181]  sysfs_kf_seq_show from seq_read_iter+0xd0/0x4e4
[ 2203.798555]  seq_read_iter from vfs_read+0x238/0x2a0
[ 2203.802236]  vfs_read from ksys_read+0xa4/0xd4
[ 2203.805385]  ksys_read from ret_fast_syscall+0x0/0x54
[ 2203.809135] Exception stack(0xe0badfa8 to 0xe0badff0)
[ 2203.812880] dfa0:                   00000003 b6f10f80 00000003 b6eab000 00020000 00000000
[ 2203.819746] dfc0: 00000003 b6f10f80 7ff00000 00000003 00000003 00000000 00020000 00000000
[ 2203.826619] dfe0: b6e1bc88 bed80958 b6e1bc94 b6e1bcb0
[ 2203.830363] Code: bad PC value
[ 2203.832695] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230700">SUSE bug 1230700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46716</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46716" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor

Remove list_del call in msgdma_chan_desc_cleanup, this should be the role
of msgdma_free_descriptor. In consequence replace list_add_tail with
list_move_tail in msgdma_free_descriptor.

This fixes the path:
   msgdma_free_chan_resources -&gt; msgdma_free_descriptors -&gt;
   msgdma_free_desc_list -&gt; msgdma_free_descriptor

which does not correctly free the descriptors as first nodes were not
removed from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46717</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46717" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: SHAMPO, Fix incorrect page release

Under the following conditions:
1) No skb created yet
2) header_size == 0 (no SHAMPO header)
3) header_index + 1 % MLX5E_SHAMPO_WQ_HEADER_PER_PAGE == 0 (this is the
   last page fragment of a SHAMPO header page)

a new skb is formed with a page that is NOT a SHAMPO header page (it
is a regular data page). Further down in the same function
(mlx5e_handle_rx_cqe_mpwrq_shampo()), a SHAMPO header page from
header_index is released. This is wrong and it leads to SHAMPO header
pages being released more than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230719">SUSE bug 1230719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46719</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Fix null pointer dereference in trace

ucsi_register_altmode checks IS_ERR for the alt pointer and treats
NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled,
ucsi_register_displayport returns NULL which causes a NULL pointer
dereference in trace. Rather than return NULL, call
typec_port_register_altmode to register DisplayPort alternate mode
as a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230722">SUSE bug 1230722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46720</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix dereference after null check

check the pointer hive before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230724">SUSE bug 1230724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46721</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46721" ref_url="https://www.suse.com/security/cve/CVE-2024-46721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

apparmor: fix possible NULL pointer dereference

profile-&gt;parent-&gt;dents[AAFS_PROF_DIR] could be NULL only if its parent is made
from __create_missing_ancestors(..) and 'ent-&gt;old' is NULL in
aa_replace_profiles(..).
In that case, it must return an error code and the code, -ENOENT represents
its state that the path of its parent is not existed yet.

BUG: kernel NULL pointer dereference, address: 0000000000000030
PGD 0 P4D 0
PREEMPT SMP PTI
CPU: 4 PID: 3362 Comm: apparmor_parser Not tainted 6.8.0-24-generic #24
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
RIP: 0010:aafs_create.constprop.0+0x7f/0x130
Code: 4c 63 e0 48 83 c4 18 4c 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d 31 d2 31 c9 31 f6 31 ff 45 31 c0 45 31 c9 45 31 d2 c3 cc cc cc cc &lt;4d&gt; 8b 55 30 4d 8d ba a0 00 00 00 4c 89 55 c0 4c 89 ff e8 7a 6a ae
RSP: 0018:ffffc9000b2c7c98 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000041ed RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000b2c7cd8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff82baac10
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007be9f22cf740(0000) GS:ffff88817bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000030 CR3: 0000000134b08000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x6d/0x80
 ? __die+0x24/0x80
 ? page_fault_oops+0x99/0x1b0
 ? kernelmode_fixup_or_oops+0xb2/0x140
 ? __bad_area_nosemaphore+0x1a5/0x2c0
 ? find_vma+0x34/0x60
 ? bad_area_nosemaphore+0x16/0x30
 ? do_user_addr_fault+0x2a2/0x6b0
 ? exc_page_fault+0x83/0x1b0
 ? asm_exc_page_fault+0x27/0x30
 ? aafs_create.constprop.0+0x7f/0x130
 ? aafs_create.constprop.0+0x51/0x130
 __aafs_profile_mkdir+0x3d6/0x480
 aa_replace_profiles+0x83f/0x1270
 policy_update+0xe3/0x180
 profile_load+0xbc/0x150
 ? rw_verify_area+0x47/0x140
 vfs_write+0x100/0x480
 ? __x64_sys_openat+0x55/0xa0
 ? syscall_exit_to_user_mode+0x86/0x260
 ksys_write+0x73/0x100
 __x64_sys_write+0x19/0x30
 x64_sys_call+0x7e/0x25c0
 do_syscall_64+0x7f/0x180
 entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7be9f211c574
Code: c7 00 16 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 80 3d d5 ea 0e 00 00 74 13 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 55 48 89 e5 48 83 ec 20 48 89
RSP: 002b:00007ffd26f2b8c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00005d504415e200 RCX: 00007be9f211c574
RDX: 0000000000001fc1 RSI: 00005d504418bc80 RDI: 0000000000000004
RBP: 0000000000001fc1 R08: 0000000000001fc1 R09: 0000000080000000
R10: 0000000000000000 R11: 0000000000000202 R12: 00005d504418bc80
R13: 0000000000000004 R14: 00007ffd26f2b9b0 R15: 00007ffd26f2ba30
 &lt;/TASK&gt;
Modules linked in: snd_seq_dummy snd_hrtimer qrtr snd_hda_codec_generic snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_pcm snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device i2c_i801 snd_timer i2c_smbus qxl snd soundcore drm_ttm_helper lpc_ich ttm joydev input_leds serio_raw mac_hid binfmt_misc msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs qemu_fw_cfg ip_tables x_tables autofs4 hid_generic usbhid hid ahci libahci psmouse virtio_rng xhci_pci xhci_pci_renesas
CR2: 0000000000000030
---[ end trace 0000000000000000 ]---
RIP: 0010:aafs_create.constprop.0+0x7f/0x130
Code: 4c 63 e0 48 83 c4 18 4c 89 e0 5b 41 5c 41 5d 41 5e 41 5f 5d 31 d2 31 c9 31 f6 31 ff 45 31 c0 45 31 c9 45 31 d2 c3 cc cc cc cc &lt;4d&gt; 8b 55 30 4d 8d ba a0 00 00 00 4c 89 55 c0 4c 89 ff e8 7a 6a ae
RSP: 0018:ffffc9000b2c7c98 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000041ed RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000b2c7cd8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46721/">CVE-2024-46721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230710">SUSE bug 1230710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46722</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix mc_data out-of-bounds read warning

Clear warning that read mc_data[i-1] may out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230712">SUSE bug 1230712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46723</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix ucode out-of-bounds read warning

Clear warning that read ucode[] may out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230702">SUSE bug 1230702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46724</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number

Check the fb_channel_number range to avoid the array out-of-bounds
read error
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230725">SUSE bug 1230725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46725</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds write warning

Check the ring type value to fix the out-of-bounds
write warning
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230705">SUSE bug 1230705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46726</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46726" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Ensure index calculation will not overflow

[WHY &amp; HOW]
Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will
never overflow and exceess array size.

This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230706">SUSE bug 1230706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46727" ref_url="https://www.suse.com/security/cve/CVE-2024-46727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update

[Why]
Coverity reports NULL_RETURN warning.

[How]
Add otg_master NULL check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46727/">CVE-2024-46727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46727">CVE-2024-46727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230707">SUSE bug 1230707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46728</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46728" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check index for aux_rd_interval before using

aux_rd_interval has size of 7 and should be checked.

This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230703">SUSE bug 1230703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46730</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46730" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Ensure array index tg_inst won't be -1

[WHY &amp; HOW]
tg_inst will be a negative if timing_generator_count equals 0, which
should be checked before used.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230701">SUSE bug 1230701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46731</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix the Out-of-bounds read warning

using index i - 1U may beyond element index
for mc_data[] when i = 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230709">SUSE bug 1230709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46732</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Assign linear_pitch_alignment even for VM

[Description]
Assign linear_pitch_alignment so we don't cause a divide by 0
error in VM environments
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230711">SUSE bug 1230711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fix kernel crash if commands allocation fails

If the commands allocation fails in nvmet_tcp_alloc_cmds()
the kernel crashes in nvmet_tcp_release_queue_work() because of
a NULL pointer dereference.

  nvmet: failed to install queue 0 cntlid 1 ret 6
  Unable to handle kernel NULL pointer dereference at
         virtual address 0000000000000008

Fix the bug by setting queue-&gt;nr_cmds to zero in case
nvmet_tcp_alloc_cmd() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230730">SUSE bug 1230730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: Fix use-after-free when removing resource in vmci_resource_remove()

When removing a resource from vmci_resource_table in
vmci_resource_remove(), the search is performed using the resource
handle by comparing context and resource fields.

It is possible though to create two resources with different types
but same handle (same context and resource fields).

When trying to remove one of the resources, vmci_resource_remove()
may not remove the intended one, but the object will still be freed
as in the case of the datagram type in vmci_datagram_destroy_handle().
vmci_resource_table will still hold a pointer to this freed resource
leading to a use-after-free vulnerability.

BUG: KASAN: use-after-free in vmci_handle_is_equal include/linux/vmw_vmci_defs.h:142 [inline]
BUG: KASAN: use-after-free in vmci_resource_remove+0x3a1/0x410 drivers/misc/vmw_vmci/vmci_resource.c:147
Read of size 4 at addr ffff88801c16d800 by task syz-executor197/1592
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x82/0xa9 lib/dump_stack.c:106
 print_address_description.constprop.0+0x21/0x366 mm/kasan/report.c:239
 __kasan_report.cold+0x7f/0x132 mm/kasan/report.c:425
 kasan_report+0x38/0x51 mm/kasan/report.c:442
 vmci_handle_is_equal include/linux/vmw_vmci_defs.h:142 [inline]
 vmci_resource_remove+0x3a1/0x410 drivers/misc/vmw_vmci/vmci_resource.c:147
 vmci_qp_broker_detach+0x89a/0x11b9 drivers/misc/vmw_vmci/vmci_queue_pair.c:2182
 ctx_free_ctx+0x473/0xbe1 drivers/misc/vmw_vmci/vmci_context.c:444
 kref_put include/linux/kref.h:65 [inline]
 vmci_ctx_put drivers/misc/vmw_vmci/vmci_context.c:497 [inline]
 vmci_ctx_destroy+0x170/0x1d6 drivers/misc/vmw_vmci/vmci_context.c:195
 vmci_host_close+0x125/0x1ac drivers/misc/vmw_vmci/vmci_host.c:143
 __fput+0x261/0xa34 fs/file_table.c:282
 task_work_run+0xf0/0x194 kernel/task_work.c:164
 tracehook_notify_resume include/linux/tracehook.h:189 [inline]
 exit_to_user_mode_loop+0x184/0x189 kernel/entry/common.c:187
 exit_to_user_mode_prepare+0x11b/0x123 kernel/entry/common.c:220
 __syscall_exit_to_user_mode_work kernel/entry/common.c:302 [inline]
 syscall_exit_to_user_mode+0x18/0x42 kernel/entry/common.c:313
 do_syscall_64+0x41/0x85 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x6e/0x0

This change ensures the type is also checked when removing
the resource from vmci_resource_table in vmci_resource_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230731">SUSE bug 1230731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind

For primary VM Bus channels, primary_channel pointer is always NULL. This
pointer is valid only for the secondary channels. Also, rescind callback
is meant for primary channels only.

Fix NULL pointer dereference by retrieving the device_obj from the parent
for the primary channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230732">SUSE bug 1230732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46743</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of/irq: Prevent device address out-of-bounds read in interrupt map walk

When of_irq_parse_raw() is invoked with a device address smaller than
the interrupt parent node (from #address-cells property), KASAN detects
the following out-of-bounds read when populating the initial match table
(dyndbg="func of_irq_parse_* +p"):

  OF: of_irq_parse_one: dev=/soc@0/picasso/watchdog, index=0
  OF:  parent=/soc@0/pci@878000000000/gpio0@17,0, intsize=2
  OF:  intspec=4
  OF: of_irq_parse_raw: ipar=/soc@0/pci@878000000000/gpio0@17,0, size=2
  OF:  -&gt; addrsize=3
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in of_irq_parse_raw+0x2b8/0x8d0
  Read of size 4 at addr ffffff81beca5608 by task bash/764

  CPU: 1 PID: 764 Comm: bash Tainted: G           O       6.1.67-484c613561-nokia_sm_arm64 #1
  Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.01-12.24.03-dirty 01/01/2023
  Call trace:
   dump_backtrace+0xdc/0x130
   show_stack+0x1c/0x30
   dump_stack_lvl+0x6c/0x84
   print_report+0x150/0x448
   kasan_report+0x98/0x140
   __asan_load4+0x78/0xa0
   of_irq_parse_raw+0x2b8/0x8d0
   of_irq_parse_one+0x24c/0x270
   parse_interrupts+0xc0/0x120
   of_fwnode_add_links+0x100/0x2d0
   fw_devlink_parse_fwtree+0x64/0xc0
   device_add+0xb38/0xc30
   of_device_add+0x64/0x90
   of_platform_device_create_pdata+0xd0/0x170
   of_platform_bus_create+0x244/0x600
   of_platform_notify+0x1b0/0x254
   blocking_notifier_call_chain+0x9c/0xd0
   __of_changeset_entry_notify+0x1b8/0x230
   __of_changeset_apply_notify+0x54/0xe4
   of_overlay_fdt_apply+0xc04/0xd94
   ...

  The buggy address belongs to the object at ffffff81beca5600
   which belongs to the cache kmalloc-128 of size 128
  The buggy address is located 8 bytes inside of
   128-byte region [ffffff81beca5600, ffffff81beca5680)

  The buggy address belongs to the physical page:
  page:00000000230d3d03 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1beca4
  head:00000000230d3d03 order:1 compound_mapcount:0 compound_pincount:0
  flags: 0x8000000000010200(slab|head|zone=2)
  raw: 8000000000010200 0000000000000000 dead000000000122 ffffff810000c300
  raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffffff81beca5500: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffffff81beca5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  &gt;ffffff81beca5600: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                        ^
   ffffff81beca5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffffff81beca5700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
  ==================================================================
  OF:  -&gt; got it !

Prevent the out-of-bounds read by copying the device address into a
buffer of sufficient size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230756">SUSE bug 1230756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46744</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: sanity check symbolic link size

Syzkiller reports a "KMSAN: uninit-value in pick_link" bug.

This is caused by an uninitialised page, which is ultimately caused
by a corrupted symbolic link size read from disk.

The reason why the corrupted symlink size causes an uninitialised
page is due to the following sequence of events:

1. squashfs_read_inode() is called to read the symbolic
   link from disk.  This assigns the corrupted value
   3875536935 to inode-&gt;i_size.

2. Later squashfs_symlink_read_folio() is called, which assigns
   this corrupted value to the length variable, which being a
   signed int, overflows producing a negative number.

3. The following loop that fills in the page contents checks that
   the copied bytes is less than length, which being negative means
   the loop is skipped, producing an uninitialised page.

This patch adds a sanity check which checks that the symbolic
link size is not larger than expected.

--

V2: fix spelling mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230747">SUSE bug 1230747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - reject requests with unreasonable number of slots


When exercising uinput interface syzkaller may try setting up device
with a really large number of slots, which causes memory allocation
failure in input_mt_init_slots(). While this allocation failure is
handled properly and request is rejected, it results in syzkaller
reports. Additionally, such request may put undue burden on the
system which will try to free a lot of memory for a bogus request.

Fix it by limiting allowed number of slots to 100. This can easily
be extended if we see devices that can track more than 100 contacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230748">SUSE bug 1230748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46746</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: free driver_data after destroying hid device

HID driver callbacks aren't called anymore once hid_destroy_device() has
been called. Hence, hid driver_data should be freed only after the
hid_destroy_device() function returned as driver_data is used in several
callbacks.

I observed a crash with kernel 6.10.0 on my T14s Gen 3, after enabling
KASAN to debug memory allocation, I got this output:

  [   13.050438] ==================================================================
  [   13.054060] BUG: KASAN: slab-use-after-free in amd_sfh_get_report+0x3ec/0x530 [amd_sfh]
  [   13.054809] psmouse serio1: trackpoint: Synaptics TrackPoint firmware: 0x02, buttons: 3/3
  [   13.056432] Read of size 8 at addr ffff88813152f408 by task (udev-worker)/479

  [   13.060970] CPU: 5 PID: 479 Comm: (udev-worker) Not tainted 6.10.0-arch1-2 #1 893bb55d7f0073f25c46adbb49eb3785fefd74b0
  [   13.063978] Hardware name: LENOVO 21CQCTO1WW/21CQCTO1WW, BIOS R22ET70W (1.40 ) 03/21/2024
  [   13.067860] Call Trace:
  [   13.069383] input: TPPS/2 Synaptics TrackPoint as /devices/platform/i8042/serio1/input/input8
  [   13.071486]  &lt;TASK&gt;
  [   13.071492]  dump_stack_lvl+0x5d/0x80
  [   13.074870] snd_hda_intel 0000:33:00.6: enabling device (0000 -&gt; 0002)
  [   13.078296]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.082199]  print_report+0x174/0x505
  [   13.085776]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
  [   13.089367]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.093255]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.097464]  kasan_report+0xc8/0x150
  [   13.101461]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.105802]  amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.110303]  amdtp_hid_request+0xb8/0x110 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.114879]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.119450]  sensor_hub_get_feature+0x1d3/0x540 [hid_sensor_hub 3f13be3016ff415bea03008d45d99da837ee3082]
  [   13.124097]  hid_sensor_parse_common_attributes+0x4d0/0xad0 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]
  [   13.127404]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.131925]  ? __pfx_hid_sensor_parse_common_attributes+0x10/0x10 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]
  [   13.136455]  ? _raw_spin_lock_irqsave+0x96/0xf0
  [   13.140197]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
  [   13.143602]  ? devm_iio_device_alloc+0x34/0x50 [industrialio 3d261d5e5765625d2b052be40e526d62b1d2123b]
  [   13.147234]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.150446]  ? __devm_add_action+0x167/0x1d0
  [   13.155061]  hid_gyro_3d_probe+0x120/0x7f0 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]
  [   13.158581]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.161814]  platform_probe+0xa2/0x150
  [   13.165029]  really_probe+0x1e3/0x8a0
  [   13.168243]  __driver_probe_device+0x18c/0x370
  [   13.171500]  driver_probe_device+0x4a/0x120
  [   13.175000]  __driver_attach+0x190/0x4a0
  [   13.178521]  ? __pfx___driver_attach+0x10/0x10
  [   13.181771]  bus_for_each_dev+0x106/0x180
  [   13.185033]  ? __pfx__raw_spin_lock+0x10/0x10
  [   13.188229]  ? __pfx_bus_for_each_dev+0x10/0x10
  [   13.191446]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.194382]  bus_add_driver+0x29e/0x4d0
  [   13.197328]  driver_register+0x1a5/0x360
  [   13.200283]  ? __pfx_hid_gyro_3d_platform_driver_init+0x10/0x10 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]
  [   13.203362]  do_one_initcall+0xa7/0x380
  [   13.206432]  ? __pfx_do_one_initcall+0x10/0x10
  [   13.210175]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.213211]  ? kasan_unpoison+0x44/0x70
  [   13.216688]  do_init_module+0x238/0x750
  [   13.2196
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230751">SUSE bug 1230751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup

report_fixup for the Cougar 500k Gaming Keyboard was not verifying
that the report descriptor size was correct before accessing it
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230752">SUSE bug 1230752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46750</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Add missing bridge lock to pci_bus_lock()

One of the true positives that the cfg_access_lock lockdep effort
identified is this sequence:

  WARNING: CPU: 14 PID: 1 at drivers/pci/pci.c:4886 pci_bridge_secondary_bus_reset+0x5d/0x70
  RIP: 0010:pci_bridge_secondary_bus_reset+0x5d/0x70
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0x8c/0x190
   ? pci_bridge_secondary_bus_reset+0x5d/0x70
   ? report_bug+0x1f8/0x200
   ? handle_bug+0x3c/0x70
   ? exc_invalid_op+0x18/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? pci_bridge_secondary_bus_reset+0x5d/0x70
   pci_reset_bus+0x1d8/0x270
   vmd_probe+0x778/0xa10
   pci_device_probe+0x95/0x120

Where pci_reset_bus() users are triggering unlocked secondary bus resets.
Ironically pci_bus_reset(), several calls down from pci_reset_bus(), uses
pci_bus_lock() before issuing the reset which locks everything *but* the
bridge itself.

For the same motivation as adding:

  bridge = pci_upstream_bridge(dev);
  if (bridge)
    pci_dev_lock(bridge);

to pci_reset_function() for the "bus" and "cxl_bus" reset cases, add
pci_dev_lock() for @bus-&gt;self to pci_bus_lock().

[bhelgaas: squash in recursive locking deadlock fix from Keith Busch:
https://lore.kernel.org/r/20240711193650.701834-1-kbusch@meta.com]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230783">SUSE bug 1230783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46751</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()

Instead of doing a BUG_ON() handle the error by returning -EUCLEAN,
aborting the transaction and logging an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230786">SUSE bug 1230786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46752</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: replace BUG_ON() with error handling at update_ref_for_cow()

Instead of a BUG_ON() just return an error, log an error message and
abort the transaction in case we find an extent buffer belonging to the
relocation tree that doesn't have the full backref flag set. This is
unexpected and should never happen (save for bugs or a potential bad
memory).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230794">SUSE bug 1230794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46753</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: handle errors from btrfs_dec_ref() properly

In walk_up_proc() we BUG_ON(ret) from btrfs_dec_ref().  This is
incorrect, we have proper error handling here, return the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230796">SUSE bug 1230796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46754</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Remove tst_run from lwt_seg6local_prog_ops.

The syzbot reported that the lwt_seg6 related BPF ops can be invoked
via bpf_test_run() without without entering input_action_end_bpf()
first.

Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL
probably didn't work since it was introduced in commit 04d4b274e2a
("ipv6: sr: Add seg6local action End.BPF"). The reason is that the
per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self
test case but each BPF function expects it.

Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230801">SUSE bug 1230801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46755</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()

mwifiex_get_priv_by_id() returns the priv pointer corresponding to
the bss_num and bss_type, but without checking if the priv is actually
currently in use.
Unused priv pointers do not have a wiphy attached to them which can
lead to NULL pointer dereferences further down the callstack.  Fix
this by returning only used priv pointers which have priv-&gt;bss_mode
set to something else than NL80211_IFTYPE_UNSPECIFIED.

Said NULL pointer dereference happened when an Accesspoint was started
with wpa_supplicant -i mlan0 with this config:

network={
        ssid="somessid"
        mode=2
        frequency=2412
        key_mgmt=WPA-PSK WPA-PSK-SHA256
        proto=RSN
        group=CCMP
        pairwise=CCMP
        psk="12345678"
}

When waiting for the AP to be established, interrupting wpa_supplicant
with &lt;ctrl-c&gt; and starting it again this happens:

| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000140
| Mem abort info:
|   ESR = 0x0000000096000004
|   EC = 0x25: DABT (current EL), IL = 32 bits
|   SET = 0, FnV = 0
|   EA = 0, S1PTW = 0
|   FSC = 0x04: level 0 translation fault
| Data abort info:
|   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
|   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
|   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
| user pgtable: 4k pages, 48-bit VAs, pgdp=0000000046d96000
| [0000000000000140] pgd=0000000000000000, p4d=0000000000000000
| Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
| Modules linked in: caam_jr caamhash_desc spidev caamalg_desc crypto_engine authenc libdes mwifiex_sdio
+mwifiex crct10dif_ce cdc_acm onboard_usb_hub fsl_imx8_ddr_perf imx8m_ddrc rtc_ds1307 lm75 rtc_snvs
+imx_sdma caam imx8mm_thermal spi_imx error imx_cpufreq_dt fuse ip_tables x_tables ipv6
| CPU: 0 PID: 8 Comm: kworker/0:1 Not tainted 6.9.0-00007-g937242013fce-dirty #18
| Hardware name: somemachine (DT)
| Workqueue: events sdio_irq_work
| pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : mwifiex_get_cfp+0xd8/0x15c [mwifiex]
| lr : mwifiex_get_cfp+0x34/0x15c [mwifiex]
| sp : ffff8000818b3a70
| x29: ffff8000818b3a70 x28: ffff000006bfd8a5 x27: 0000000000000004
| x26: 000000000000002c x25: 0000000000001511 x24: 0000000002e86bc9
| x23: ffff000006bfd996 x22: 0000000000000004 x21: ffff000007bec000
| x20: 000000000000002c x19: 0000000000000000 x18: 0000000000000000
| x17: 000000040044ffff x16: 00500072b5503510 x15: ccc283740681e517
| x14: 0201000101006d15 x13: 0000000002e8ff43 x12: 002c01000000ffb1
| x11: 0100000000000000 x10: 02e8ff43002c0100 x9 : 0000ffb100100157
| x8 : ffff000003d20000 x7 : 00000000000002f1 x6 : 00000000ffffe124
| x5 : 0000000000000001 x4 : 0000000000000003 x3 : 0000000000000000
| x2 : 0000000000000000 x1 : 0001000000011001 x0 : 0000000000000000
| Call trace:
|  mwifiex_get_cfp+0xd8/0x15c [mwifiex]
|  mwifiex_parse_single_response_buf+0x1d0/0x504 [mwifiex]
|  mwifiex_handle_event_ext_scan_report+0x19c/0x2f8 [mwifiex]
|  mwifiex_process_sta_event+0x298/0xf0c [mwifiex]
|  mwifiex_process_event+0x110/0x238 [mwifiex]
|  mwifiex_main_process+0x428/0xa44 [mwifiex]
|  mwifiex_sdio_interrupt+0x64/0x12c [mwifiex_sdio]
|  process_sdio_pending_irqs+0x64/0x1b8
|  sdio_irq_work+0x4c/0x7c
|  process_one_work+0x148/0x2a0
|  worker_thread+0x2fc/0x40c
|  kthread+0x110/0x114
|  ret_from_fork+0x10/0x20
| Code: a94153f3 a8c37bfd d50323bf d65f03c0 (f940a000)
| ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230802">SUSE bug 1230802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46756</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230806">SUSE bug 1230806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46758</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230812">SUSE bug 1230812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46759</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (adc128d818) Fix underflows seen when writing limit attributes

DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large
negative number such as -9223372036854775808 is provided by the user.
Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230814">SUSE bug 1230814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46761</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv

The hotplug driver for powerpc (pci/hotplug/pnv_php.c) causes a kernel
crash when we try to hot-unplug/disable the PCIe switch/bridge from
the PHB.

The crash occurs because although the MSI data structure has been
released during disable/hot-unplug path and it has been assigned
with NULL, still during unregistration the code was again trying to
explicitly disable the MSI which causes the NULL pointer dereference and
kernel crash.

The patch fixes the check during unregistration path to prevent invoking
pci_disable_msi/msix() since its data structure is already freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230761">SUSE bug 1230761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46770</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46770" ref_url="https://www.suse.com/security/cve/CVE-2024-46770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Add netif_device_attach/detach into PF reset flow

Ethtool callbacks can be executed while reset is in progress and try to
access deleted resources, e.g. getting coalesce settings can result in a
NULL pointer dereference seen below.

Reproduction steps:
Once the driver is fully initialized, trigger reset:
	# echo 1 &gt; /sys/class/net/&lt;interface&gt;/device/reset
when reset is in progress try to get coalesce settings using ethtool:
	# ethtool -c &lt;interface&gt;

BUG: kernel NULL pointer dereference, address: 0000000000000020
PGD 0 P4D 0
Oops: Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 11 PID: 19713 Comm: ethtool Tainted: G S                 6.10.0-rc7+ #7
RIP: 0010:ice_get_q_coalesce+0x2e/0xa0 [ice]
RSP: 0018:ffffbab1e9bcf6a8 EFLAGS: 00010206
RAX: 000000000000000c RBX: ffff94512305b028 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff9451c3f2e588 RDI: ffff9451c3f2e588
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: ffff9451c3f2e580 R11: 000000000000001f R12: ffff945121fa9000
R13: ffffbab1e9bcf760 R14: 0000000000000013 R15: ffffffff9e65dd40
FS:  00007faee5fbe740(0000) GS:ffff94546fd80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000020 CR3: 0000000106c2e005 CR4: 00000000001706f0
Call Trace:
&lt;TASK&gt;
ice_get_coalesce+0x17/0x30 [ice]
coalesce_prepare_data+0x61/0x80
ethnl_default_doit+0xde/0x340
genl_family_rcv_msg_doit+0xf2/0x150
genl_rcv_msg+0x1b3/0x2c0
netlink_rcv_skb+0x5b/0x110
genl_rcv+0x28/0x40
netlink_unicast+0x19c/0x290
netlink_sendmsg+0x222/0x490
__sys_sendto+0x1df/0x1f0
__x64_sys_sendto+0x24/0x30
do_syscall_64+0x82/0x160
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7faee60d8e27

Calling netif_device_detach() before reset makes the net core not call
the driver when ethtool command is issued, the attempt to execute an
ethtool command during reset will result in the following message:

    netlink error: No such device

instead of NULL pointer dereference. Once reset is done and
ice_rebuild() is executing, the netif_device_attach() is called to allow
for ethtool operations to occur again in a safe manner.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46770/">CVE-2024-46770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230763">SUSE bug 1230763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46771</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Remove proc entry when dev is unregistered.

syzkaller reported a warning in bcm_connect() below. [0]

The repro calls connect() to vxcan1, removes vxcan1, and calls
connect() with ifindex == 0.

Calling connect() for a BCM socket allocates a proc entry.
Then, bcm_sk(sk)-&gt;bound is set to 1 to prevent further connect().

However, removing the bound device resets bcm_sk(sk)-&gt;bound to 0
in bcm_notify().

The 2nd connect() tries to allocate a proc entry with the same
name and sets NULL to bcm_sk(sk)-&gt;bcm_proc_read, leaking the
original proc entry.

Since the proc entry is available only for connect()ed sockets,
let's clean up the entry when the bound netdev is unregistered.

[0]:
proc_dir_entry 'can-bcm/2456' already registered
WARNING: CPU: 1 PID: 394 at fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375
Modules linked in:
CPU: 1 PID: 394 Comm: syz-executor403 Not tainted 6.10.0-rc7-g852e42cc2dd4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375
Code: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 &lt;0f&gt; 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48
RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246
RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002
RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0
R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec
FS:  00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220
 bcm_connect+0x472/0x840 net/can/bcm.c:1673
 __sys_connect_file net/socket.c:2049 [inline]
 __sys_connect+0x5d2/0x690 net/socket.c:2066
 __do_sys_connect net/socket.c:2076 [inline]
 __se_sys_connect net/socket.c:2073 [inline]
 __x64_sys_connect+0x8f/0x100 net/socket.c:2073
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fbd708b0e5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d
RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040
R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098
R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000
 &lt;/TASK&gt;
remove_proc_entry: removing non-empty directory 'net/can-bcm', leaking at least '2456'
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230766">SUSE bug 1230766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46772</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46772" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46772" ref_url="https://www.suse.com/security/cve/CVE-2024-46772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check denominator crb_pipes before used

[WHAT &amp; HOW]
A denominator cannot be 0, and is checked before used.

This fixes 2 DIVIDE_BY_ZERO issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46772/">CVE-2024-46772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46772">CVE-2024-46772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230772">SUSE bug 1230772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46773</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check denominator pbn_div before used

[WHAT &amp; HOW]
A denominator cannot be 0, and is checked before used.

This fixes 1 DIVIDE_BY_ZERO issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230791">SUSE bug 1230791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46774</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46774" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()

Smatch warns:

  arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential
  spectre issue 'args.args' [r] (local cap)

The 'nargs' and 'nret' locals come directly from a user-supplied
buffer and are used as indexes into a small stack-based array and as
inputs to copy_to_user() after they are subject to bounds checks.

Use array_index_nospec() after the bounds checks to clamp these values
for speculative execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46775</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Validate function returns

[WHAT &amp; HOW]
Function return values must be checked before data can be used
in subsequent functions.

This fixes 4 CHECKED_RETURN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230774">SUSE bug 1230774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46777</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46777" ref_url="https://www.suse.com/security/cve/CVE-2024-46777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid excessive partition lengths

Avoid mounting filesystems where the partition would overflow the
32-bits used for block number. Also refuse to mount filesystems where
the partition length is so large we cannot safely index bits in a
block bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46777/">CVE-2024-46777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230773">SUSE bug 1230773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46778</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46778" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46778" ref_url="https://www.suse.com/security/cve/CVE-2024-46778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check UnboundedRequestEnabled's value

CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled
is a pointer (i.e. dml_bool_t *UnboundedRequestEnabled), and thus
if (p-&gt;UnboundedRequestEnabled) checks its address, not bool value.

This fixes 1 REVERSE_INULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46778/">CVE-2024-46778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46778">CVE-2024-46778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230776">SUSE bug 1230776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46780</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: protect references to superblock parameters exposed in sysfs

The superblock buffers of nilfs2 can not only be overwritten at runtime
for modifications/repairs, but they are also regularly swapped, replaced
during resizing, and even abandoned when degrading to one side due to
backing device issues.  So, accessing them requires mutual exclusion using
the reader/writer semaphore "nilfs-&gt;ns_sem".

Some sysfs attribute show methods read this superblock buffer without the
necessary mutual exclusion, which can cause problems with pointer
dereferencing and memory access, so fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230808">SUSE bug 1230808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46781</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix missing cleanup on rollforward recovery error

In an error injection test of a routine for mount-time recovery, KASAN
found a use-after-free bug.

It turned out that if data recovery was performed using partial logs
created by dsync writes, but an error occurred before starting the log
writer to create a recovered checkpoint, the inodes whose data had been
recovered were left in the ns_dirty_files list of the nilfs object and
were not freed.

Fix this issue by cleaning up inodes that have read the recovery data if
the recovery routine fails midway before the log writer starts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230768">SUSE bug 1230768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46783</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: fix return value of tcp_bpf_sendmsg()

When we cork messages in psock-&gt;cork, the last message triggers the
flushing will result in sending a sk_msg larger than the current
message size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes
negative at least in the following case:

468         case __SK_DROP:
469         default:
470                 sk_msg_free_partial(sk, msg, tosend);
471                 sk_msg_apply_bytes(psock, tosend);
472                 *copied -= (tosend + delta); // &lt;==== HERE
473                 return -EACCES;

Therefore, it could lead to the following BUG with a proper value of
'copied' (thanks to syzbot). We should not use negative 'copied' as a
return value here.

  ------------[ cut here ]------------
  kernel BUG at net/socket.c:733!
  Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
  Modules linked in:
  CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0
  Hardware name: linux,dummy-virt (DT)
  pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
  pc : sock_sendmsg_nosec net/socket.c:733 [inline]
  pc : sock_sendmsg_nosec net/socket.c:728 [inline]
  pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745
  lr : sock_sendmsg_nosec net/socket.c:730 [inline]
  lr : __sock_sendmsg+0x54/0x60 net/socket.c:745
  sp : ffff800088ea3b30
  x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000
  x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000
  x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90
  x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001
  x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0
  x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000
  x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900
  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef
  Call trace:
   sock_sendmsg_nosec net/socket.c:733 [inline]
   __sock_sendmsg+0x5c/0x60 net/socket.c:745
   ____sys_sendmsg+0x274/0x2ac net/socket.c:2597
   ___sys_sendmsg+0xac/0x100 net/socket.c:2651
   __sys_sendmsg+0x84/0xe0 net/socket.c:2680
   __do_sys_sendmsg net/socket.c:2689 [inline]
   __se_sys_sendmsg net/socket.c:2687 [inline]
   __arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49
   el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151
   el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598
  Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000)
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230810">SUSE bug 1230810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46784</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup

Currently napi_disable() gets called during rxq and txq cleanup,
even before napi is enabled and hrtimer is initialized. It causes
kernel panic.

? page_fault_oops+0x136/0x2b0
  ? page_counter_cancel+0x2e/0x80
  ? do_user_addr_fault+0x2f2/0x640
  ? refill_obj_stock+0xc4/0x110
  ? exc_page_fault+0x71/0x160
  ? asm_exc_page_fault+0x27/0x30
  ? __mmdrop+0x10/0x180
  ? __mmdrop+0xec/0x180
  ? hrtimer_active+0xd/0x50
  hrtimer_try_to_cancel+0x2c/0xf0
  hrtimer_cancel+0x15/0x30
  napi_disable+0x65/0x90
  mana_destroy_rxq+0x4c/0x2f0
  mana_create_rxq.isra.0+0x56c/0x6d0
  ? mana_uncfg_vport+0x50/0x50
  mana_alloc_queues+0x21b/0x320
  ? skb_dequeue+0x5f/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46786</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF

The fscache_cookie_lru_timer is initialized when the fscache module
is inserted, but is not deleted when the fscache module is removed.
If timer_reduce() is called before removing the fscache module,
the fscache_cookie_lru_timer will be added to the timer list of
the current cpu. Afterwards, a use-after-free will be triggered
in the softIRQ after removing the fscache module, as follows:

==================================================================
BUG: unable to handle page fault for address: fffffbfff803c9e9
 PF: supervisor read access in kernel mode
 PF: error_code(0x0000) - not-present page
PGD 21ffea067 P4D 21ffea067 PUD 21ffe6067 PMD 110a7c067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.11.0-rc3 #855
Tainted: [W]=WARN
RIP: 0010:__run_timer_base.part.0+0x254/0x8a0
Call Trace:
 &lt;IRQ&gt;
 tmigr_handle_remote_up+0x627/0x810
 __walk_groups.isra.0+0x47/0x140
 tmigr_handle_remote+0x1fa/0x2f0
 handle_softirqs+0x180/0x590
 irq_exit_rcu+0x84/0xb0
 sysvec_apic_timer_interrupt+0x6e/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:default_idle+0xf/0x20
 default_idle_call+0x38/0x60
 do_idle+0x2b5/0x300
 cpu_startup_entry+0x54/0x60
 start_secondary+0x20d/0x280
 common_startup_64+0x13e/0x148
 &lt;/TASK&gt;
Modules linked in: [last unloaded: netfs]
==================================================================

Therefore delete fscache_cookie_lru_timer when removing the fscahe module.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230813">SUSE bug 1230813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46787</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix checks for huge PMDs

Patch series "userfaultfd: fix races around pmd_trans_huge() check", v2.

The pmd_trans_huge() code in mfill_atomic() is wrong in three different
ways depending on kernel version:

1. The pmd_trans_huge() check is racy and can lead to a BUG_ON() (if you hit
   the right two race windows) - I've tested this in a kernel build with
   some extra mdelay() calls. See the commit message for a description
   of the race scenario.
   On older kernels (before 6.5), I think the same bug can even
   theoretically lead to accessing transhuge page contents as a page table
   if you hit the right 5 narrow race windows (I haven't tested this case).
2. As pointed out by Qi Zheng, pmd_trans_huge() is not sufficient for
   detecting PMDs that don't point to page tables.
   On older kernels (before 6.5), you'd just have to win a single fairly
   wide race to hit this.
   I've tested this on 6.1 stable by racing migration (with a mdelay()
   patched into try_to_migrate()) against UFFDIO_ZEROPAGE - on my x86
   VM, that causes a kernel oops in ptlock_ptr().
3. On newer kernels (&gt;=6.5), for shmem mappings, khugepaged is allowed
   to yank page tables out from under us (though I haven't tested that),
   so I think the BUG_ON() checks in mfill_atomic() are just wrong.

I decided to write two separate fixes for these (one fix for bugs 1+2, one
fix for bug 3), so that the first fix can be backported to kernels
affected by bugs 1+2.


This patch (of 2):

This fixes two issues.

I discovered that the following race can occur:

  mfill_atomic                other thread
  ============                ============
                              &lt;zap PMD&gt;
  pmdp_get_lockless() [reads none pmd]
  &lt;bail if trans_huge&gt;
  &lt;if none:&gt;
                              &lt;pagefault creates transhuge zeropage&gt;
    __pte_alloc [no-op]
                              &lt;zap PMD&gt;
  &lt;bail if pmd_trans_huge(*dst_pmd)&gt;
  BUG_ON(pmd_none(*dst_pmd))

I have experimentally verified this in a kernel with extra mdelay() calls;
the BUG_ON(pmd_none(*dst_pmd)) triggers.

On kernels newer than commit 0d940a9b270b ("mm/pgtable: allow
pte_offset_map[_lock]() to fail"), this can't lead to anything worse than
a BUG_ON(), since the page table access helpers are actually designed to
deal with page tables concurrently disappearing; but on older kernels
(&lt;=6.4), I think we could probably theoretically race past the two
BUG_ON() checks and end up treating a hugepage as a page table.

The second issue is that, as Qi Zheng pointed out, there are other types
of huge PMDs that pmd_trans_huge() can't catch: devmap PMDs and swap PMDs
(in particular, migration PMDs).

On &lt;=6.4, this is worse than the first issue: If mfill_atomic() runs on a
PMD that contains a migration entry (which just requires winning a single,
fairly wide race), it will pass the PMD to pte_offset_map_lock(), which
assumes that the PMD points to a page table.

Breakage follows: First, the kernel tries to take the PTE lock (which will
crash or maybe worse if there is no "struct page" for the address bits in
the migration entry PMD - I think at least on X86 there usually is no
corresponding "struct page" thanks to the PTE inversion mitigation, amd64
looks different).

If that didn't crash, the kernel would next try to write a PTE into what
it wrongly thinks is a page table.

As part of fixing these issues, get rid of the check for pmd_trans_huge()
before __pte_alloc() - that's redundant, we're going to have to check for
that after the __pte_alloc() anyway.

Backport note: pmdp_get_lockless() is pmd_read_atomic() in older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230815">SUSE bug 1230815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46791</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open

The mcp251x_hw_wake() function is called with the mpc_lock mutex held and
disables the interrupt handler so that no interrupts can be processed while
waking the device. If an interrupt has already occurred then waiting for
the interrupt handler to complete will deadlock because it will be trying
to acquire the same mutex.

CPU0                           CPU1
----                           ----
mcp251x_open()
 mutex_lock(&amp;priv-&gt;mcp_lock)
  request_threaded_irq()
                               &lt;interrupt&gt;
                               mcp251x_can_ist()
                                mutex_lock(&amp;priv-&gt;mcp_lock)
  mcp251x_hw_wake()
   disable_irq() &lt;-- deadlock

Use disable_irq_nosync() instead because the interrupt handler does
everything while holding the mutex so it doesn't matter if it's still
running.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230821">SUSE bug 1230821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46794</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Fix data leak in mmio_read()

The mmio_read() function makes a TDVMCALL to retrieve MMIO data for an
address from the VMM.

Sean noticed that mmio_read() unintentionally exposes the value of an
initialized variable (val) on the stack to the VMM.

This variable is only needed as an output value. It did not need to be
passed to the VMM in the first place.

Do not send the original value of *val to the VMM.

[ dhansen: clarify what 'val' is used for. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-11-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230825">SUSE bug 1230825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46798</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object

When using kernel with the following extra config,

  - CONFIG_KASAN=y
  - CONFIG_KASAN_GENERIC=y
  - CONFIG_KASAN_INLINE=y
  - CONFIG_KASAN_VMALLOC=y
  - CONFIG_FRAME_WARN=4096

kernel detects that snd_pcm_suspend_all() access a freed
'snd_soc_pcm_runtime' object when the system is suspended, which
leads to a use-after-free bug:

[   52.047746] BUG: KASAN: use-after-free in snd_pcm_suspend_all+0x1a8/0x270
[   52.047765] Read of size 1 at addr ffff0000b9434d50 by task systemd-sleep/2330

[   52.047785] Call trace:
[   52.047787]  dump_backtrace+0x0/0x3c0
[   52.047794]  show_stack+0x34/0x50
[   52.047797]  dump_stack_lvl+0x68/0x8c
[   52.047802]  print_address_description.constprop.0+0x74/0x2c0
[   52.047809]  kasan_report+0x210/0x230
[   52.047815]  __asan_report_load1_noabort+0x3c/0x50
[   52.047820]  snd_pcm_suspend_all+0x1a8/0x270
[   52.047824]  snd_soc_suspend+0x19c/0x4e0

The snd_pcm_sync_stop() has a NULL check on 'substream-&gt;runtime' before
making any access. So we need to always set 'substream-&gt;runtime' to NULL
everytime we kfree() it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230830">SUSE bug 1230830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46800</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch/netem: fix use after free in netem_dequeue

If netem_dequeue() enqueues packet to inner qdisc and that qdisc
returns __NET_XMIT_STOLEN. The packet is dropped but
qdisc_tree_reduce_backlog() is not called to update the parent's
q.qlen, leading to the similar use-after-free as Commit
e04991a48dbaf382 ("netem: fix return value if duplicate enqueue
fails")

Commands to trigger KASAN UaF:

ip link add type dummy
ip link set lo up
ip link set dummy0 up
tc qdisc add dev lo parent root handle 1: drr
tc filter add dev lo parent 1: basic classid 1:1
tc class add dev lo classid 1:1 drr
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2: handle 3: drr
tc filter add dev lo parent 3: basic classid 3:1 action mirred egress
redirect dev dummy0
tc class add dev lo classid 3:1 drr
ping -c1 -W0.01 localhost # Trigger bug
tc class del dev lo classid 1:1
tc class add dev lo classid 1:1 drr
ping -c1 -W0.01 localhost # UaF
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46802</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: added NULL check at start of dc_validate_stream

[Why]
prevent invalid memory access

[How]
check if dc and stream are NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231111">SUSE bug 1231111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46804</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add array index check for hdcp ddc access

[Why]
Coverity reports OVERRUN warning. Do not check if array
index valid.

[How]
Check msg_id valid and valid array index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231132">SUSE bug 1231132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46805</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix the waring dereferencing hive

Check the amdgpu_hive_info *hive that maybe is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231135">SUSE bug 1231135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46807</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: Check tbo resource pointer

Validate tbo resource pointer, skip if NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231138">SUSE bug 1231138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46809</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check BIOS images before it is used

BIOS images may fail to load and null checks are added before they are
used.

This fixes 6 NULL_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231148">SUSE bug 1231148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46810</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ

Make sure the connector is fully initialized before signalling any
HPD events via drm_kms_helper_hotplug_event(), otherwise this may
lead to NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231178">SUSE bug 1231178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46811</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46811" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box

[Why]
Coverity reports OVERRUN warning. soc.num_states could
be 40. But array range of bw_params-&gt;clk_table.entries is 8.

[How]
Assert if soc.num_states greater than 8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231179">SUSE bug 1231179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46812</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration

[Why]
Coverity reports Memory - illegal accesses.

[How]
Skip inactive planes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231187">SUSE bug 1231187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46813</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46813" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check link_index before accessing dc-&gt;links[]

[WHY &amp; HOW]
dc-&gt;links[] has max size of MAX_LINKS and NULL is return when trying to
access with out-of-bound index.

This fixes 3 OVERRUN and 1 RESOURCE_LEAK issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231191">SUSE bug 1231191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231192">SUSE bug 1231192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check msg_id before processing transcation

[WHY &amp; HOW]
HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid
array index, and it needs checking before used.

This fixes 4 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231194">SUSE bug 1231194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46815</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]

[WHY &amp; HOW]
num_valid_sets needs to be checked to avoid a negative index when
accessing reader_wm_sets[num_valid_sets - 1].

This fixes an OVERRUN issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231196">SUSE bug 1231196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46816</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links

[Why]
Coverity report OVERRUN warning. There are
only max_links elements within dc-&gt;links. link
count could up to AMDGPU_DM_MAX_DISPLAY_INDEX 31.

[How]
Make sure link count less than max_links.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231197">SUSE bug 1231197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231198">SUSE bug 1231198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46817</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6

[Why]
Coverity reports OVERRUN warning. Should abort amdgpu_dm
initialize.

[How]
Return failure to amdgpu_dm_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231201">SUSE bug 1231201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46818</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check gpio_id before used as array index

[WHY &amp; HOW]
GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore
should be checked in advance.

This fixes 5 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231204">SUSE bug 1231204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46819</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: the warning dereferencing obj for nbio_v7_4

if ras_manager obj null, don't print NBIO err data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231202">SUSE bug 1231202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46821</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix negative array index read

Avoid using the negative values
for clk_idex as an index into an array pptable-&gt;DpmDescriptor.

V2: fix clk_index return check (Tim Huang)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231169">SUSE bug 1231169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46822</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry

In a review discussion of the changes to support vCPU hotplug where
a check was added on the GICC being enabled if was online, it was
noted that there is need to map back to the cpu and use that to index
into a cpumask. As such, a valid ID is needed.

If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible
for the entry in cpu_madt_gicc[cpu] == NULL.  This function would
then cause a NULL pointer dereference.   Whilst a path to trigger
this has not been established, harden this caller against the
possibility.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231120">SUSE bug 1231120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46826</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ELF: fix kernel.randomize_va_space double read

ELF loader uses "randomize_va_space" twice. It is sysctl and can change
at any moment, so 2 loads could see 2 different values in theory with
unpredictable consequences.

Issue exactly one load for consistent value across one exec.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231115">SUSE bug 1231115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46828</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: fix bulk flow accounting logic for host fairness

In sch_cake, we keep track of the count of active bulk flows per host,
when running in dst/src host fairness mode, which is used as the
round-robin weight when iterating through flows. The count of active
bulk flows is updated whenever a flow changes state.

This has a peculiar interaction with the hash collision handling: when a
hash collision occurs (after the set-associative hashing), the state of
the hash bucket is simply updated to match the new packet that collided,
and if host fairness is enabled, that also means assigning new per-host
state to the flow. For this reason, the bulk flow counters of the
host(s) assigned to the flow are decremented, before new state is
assigned (and the counters, which may not belong to the same host
anymore, are incremented again).

Back when this code was introduced, the host fairness mode was always
enabled, so the decrement was unconditional. When the configuration
flags were introduced the *increment* was made conditional, but
the *decrement* was not. Which of course can lead to a spurious
decrement (and associated wrap-around to U16_MAX).

AFAICT, when host fairness is disabled, the decrement and wrap-around
happens as soon as a hash collision occurs (which is not that common in
itself, due to the set-associative hashing). However, in most cases this
is harmless, as the value is only used when host fairness mode is
enabled. So in order to trigger an array overflow, sch_cake has to first
be configured with host fairness disabled, and while running in this
mode, a hash collision has to occur to cause the overflow. Then, the
qdisc has to be reconfigured to enable host fairness, which leads to the
array out-of-bounds because the wrapped-around value is retained and
used as an array index. It seems that syzbot managed to trigger this,
which is quite impressive in its own right.

This patch fixes the issue by introducing the same conditional check on
decrement as is used on increment.

The original bug predates the upstreaming of cake, but the commit listed
in the Fixes tag touched that code, meaning that this patch won't apply
before that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231114">SUSE bug 1231114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46830</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire kvm-&gt;srcu when handling KVM_SET_VCPU_EVENTS

Grab kvm-&gt;srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly
leave nested VMX/SVM if SMM mode is being toggled, and leaving nested VMX
reads guest memory.

Note, kvm_vcpu_ioctl_x86_set_vcpu_events() can also be called from KVM_RUN
via sync_regs(), which already holds SRCU.  I.e. trying to precisely use
kvm_vcpu_srcu_read_lock() around the problematic SMM code would cause
problems.  Acquiring SRCU isn't all that expensive, so for simplicity,
grab it unconditionally for KVM_SET_VCPU_EVENTS.

 =============================
 WARNING: suspicious RCU usage
 6.10.0-rc7-332d2c1d713e-next-vm #552 Not tainted
 -----------------------------
 include/linux/kvm_host.h:1027 suspicious rcu_dereference_check() usage!

 other info that might help us debug this:

 rcu_scheduler_active = 2, debug_locks = 1
 1 lock held by repro/1071:
  #0: ffff88811e424430 (&amp;vcpu-&gt;mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x7d/0x970 [kvm]

 stack backtrace:
 CPU: 15 PID: 1071 Comm: repro Not tainted 6.10.0-rc7-332d2c1d713e-next-vm #552
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x7f/0x90
  lockdep_rcu_suspicious+0x13f/0x1a0
  kvm_vcpu_gfn_to_memslot+0x168/0x190 [kvm]
  kvm_vcpu_read_guest+0x3e/0x90 [kvm]
  nested_vmx_load_msr+0x6b/0x1d0 [kvm_intel]
  load_vmcs12_host_state+0x432/0xb40 [kvm_intel]
  vmx_leave_nested+0x30/0x40 [kvm_intel]
  kvm_vcpu_ioctl_x86_set_vcpu_events+0x15d/0x2b0 [kvm]
  kvm_arch_vcpu_ioctl+0x1107/0x1750 [kvm]
  ? mark_held_locks+0x49/0x70
  ? kvm_vcpu_ioctl+0x7d/0x970 [kvm]
  ? kvm_vcpu_ioctl+0x497/0x970 [kvm]
  kvm_vcpu_ioctl+0x497/0x970 [kvm]
  ? lock_acquire+0xba/0x2d0
  ? find_held_lock+0x2b/0x80
  ? do_user_addr_fault+0x40c/0x6f0
  ? lock_release+0xb7/0x270
  __x64_sys_ioctl+0x82/0xb0
  do_syscall_64+0x6c/0x170
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7ff11eb1b539
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231116">SUSE bug 1231116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946419" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946418" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46834</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: fail closed if we can't get max channel used in indirection tables

Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with
active RSS contexts") proves that allowing indirection table to contain
channels with out of bounds IDs may lead to crashes. Currently the
max channel check in the core gets skipped if driver can't fetch
the indirection table or when we can't allocate memory.

Both of those conditions should be extremely rare but if they do
happen we should try to be safe and fail the channel change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231096">SUSE bug 1231096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46835</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix smatch static checker warning

adev-&gt;gfx.imu.funcs could be NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231098">SUSE bug 1231098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46840</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46840" ref_url="https://www.suse.com/security/cve/CVE-2024-46840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: clean up our handling of refs == 0 in snapshot delete

In reada we BUG_ON(refs == 0), which could be unkind since we aren't
holding a lock on the extent leaf and thus could get a transient
incorrect answer.  In walk_down_proc we also BUG_ON(refs == 0), which
could happen if we have extent tree corruption.  Change that to return
-EUCLEAN.  In do_walk_down() we catch this case and handle it correctly,
however we return -EIO, which -EUCLEAN is a more appropriate error code.
Finally in walk_up_proc we have the same BUG_ON(refs == 0), so convert
that to proper error handling.  Also adjust the error message so we can
actually do something with the information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46840/">CVE-2024-46840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231105">SUSE bug 1231105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46841</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46841" ref_url="https://www.suse.com/security/cve/CVE-2024-46841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()

We handle errors here properly, ENOMEM isn't fatal, return the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46841/">CVE-2024-46841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46841">CVE-2024-46841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231094">SUSE bug 1231094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46842</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46842" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info

The MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the
routine unconditionally frees submitted mailbox commands regardless of
return status.  The issue is that for MBX_TIMEOUT cases, when firmware
returns SFP information at a later time, that same mailbox memory region
references previously freed memory in its cmpl routine.

Fix by adding checks for the MBX_TIMEOUT return code.  During mailbox
resource cleanup, check the mbox flag to make sure that the wait did not
timeout.  If the MBOX_WAKE flag is not set, then do not free the resources
because it will be freed when firmware completes the mailbox at a later
time in its cmpl routine.

Also, increase the timeout from 30 to 60 seconds to accommodate boot
scripts requiring longer timeouts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231101">SUSE bug 1231101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46848</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Limit the period on Haswell

Running the ltp test cve-2015-3290 concurrently reports the following
warnings.

perfevents: irq loop stuck!
  WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/core.c:3174
  intel_pmu_handle_irq+0x285/0x370
  Call Trace:
   &lt;NMI&gt;
   ? __warn+0xa4/0x220
   ? intel_pmu_handle_irq+0x285/0x370
   ? __report_bug+0x123/0x130
   ? intel_pmu_handle_irq+0x285/0x370
   ? __report_bug+0x123/0x130
   ? intel_pmu_handle_irq+0x285/0x370
   ? report_bug+0x3e/0xa0
   ? handle_bug+0x3c/0x70
   ? exc_invalid_op+0x18/0x50
   ? asm_exc_invalid_op+0x1a/0x20
   ? irq_work_claim+0x1e/0x40
   ? intel_pmu_handle_irq+0x285/0x370
   perf_event_nmi_handler+0x3d/0x60
   nmi_handle+0x104/0x330

Thanks to Thomas Gleixner's analysis, the issue is caused by the low
initial period (1) of the frequency estimation algorithm, which triggers
the defects of the HW, specifically erratum HSW11 and HSW143. (For the
details, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/)

The HSW11 requires a period larger than 100 for the INST_RETIRED.ALL
event, but the initial period in the freq mode is 1. The erratum is the
same as the BDM11, which has been supported in the kernel. A minimum
period of 128 is enforced as well on HSW.

HSW143 is regarding that the fixed counter 1 may overcount 32 with the
Hyper-Threading is enabled. However, based on the test, the hardware
has more issues than it tells. Besides the fixed counter 1, the message
'interrupt took too long' can be observed on any counter which was armed
with a period &lt; 32 and two events expired in the same NMI. A minimum
period of 32 is enforced for the rest of the events.
The recommended workaround code of the HSW143 is not implemented.
Because it only addresses the issue for the fixed counter. It brings
extra overhead through extra MSR writing. No related overcounting issue
has been reported so far.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231072">SUSE bug 1231072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46849</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: meson: axg-card: fix 'use-after-free'

Buffer 'card-&gt;dai_link' is reallocated in 'meson_card_reallocate_links()',
so move 'pad' pointer initialization after this function when memory is
already reallocated.

Kasan bug report:

==================================================================
BUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc
Read of size 8 at addr ffff000000e8b260 by task modprobe/356

CPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1
Call trace:
 dump_backtrace+0x94/0xec
 show_stack+0x18/0x24
 dump_stack_lvl+0x78/0x90
 print_report+0xfc/0x5c0
 kasan_report+0xb8/0xfc
 __asan_load8+0x9c/0xb8
 axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card]
 meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils]
 platform_probe+0x8c/0xf4
 really_probe+0x110/0x39c
 __driver_probe_device+0xb8/0x18c
 driver_probe_device+0x108/0x1d8
 __driver_attach+0xd0/0x25c
 bus_for_each_dev+0xe0/0x154
 driver_attach+0x34/0x44
 bus_add_driver+0x134/0x294
 driver_register+0xa8/0x1e8
 __platform_driver_register+0x44/0x54
 axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card]
 do_one_initcall+0xdc/0x25c
 do_init_module+0x10c/0x334
 load_module+0x24c4/0x26cc
 init_module_from_file+0xd4/0x128
 __arm64_sys_finit_module+0x1f4/0x41c
 invoke_syscall+0x60/0x188
 el0_svc_common.constprop.0+0x78/0x13c
 do_el0_svc+0x30/0x40
 el0_svc+0x38/0x78
 el0t_64_sync_handler+0x100/0x12c
 el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231256">SUSE bug 1231256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46853</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: nxp-fspi: fix the KASAN report out-of-bounds bug

Change the memcpy length to fix the out-of-bounds issue when writing the
data that is not 4 byte aligned to TX FIFO.

To reproduce the issue, write 3 bytes data to NOR chip.

dd if=3b of=/dev/mtd0
[   36.926103] ==================================================================
[   36.933409] BUG: KASAN: slab-out-of-bounds in nxp_fspi_exec_op+0x26ec/0x2838
[   36.940514] Read of size 4 at addr ffff00081037c2a0 by task dd/455
[   36.946721]
[   36.948235] CPU: 3 UID: 0 PID: 455 Comm: dd Not tainted 6.11.0-rc5-gc7b0e37c8434 #1070
[   36.956185] Hardware name: Freescale i.MX8QM MEK (DT)
[   36.961260] Call trace:
[   36.963723]  dump_backtrace+0x90/0xe8
[   36.967414]  show_stack+0x18/0x24
[   36.970749]  dump_stack_lvl+0x78/0x90
[   36.974451]  print_report+0x114/0x5cc
[   36.978151]  kasan_report+0xa4/0xf0
[   36.981670]  __asan_report_load_n_noabort+0x1c/0x28
[   36.986587]  nxp_fspi_exec_op+0x26ec/0x2838
[   36.990800]  spi_mem_exec_op+0x8ec/0xd30
[   36.994762]  spi_mem_no_dirmap_read+0x190/0x1e0
[   36.999323]  spi_mem_dirmap_write+0x238/0x32c
[   37.003710]  spi_nor_write_data+0x220/0x374
[   37.007932]  spi_nor_write+0x110/0x2e8
[   37.011711]  mtd_write_oob_std+0x154/0x1f0
[   37.015838]  mtd_write_oob+0x104/0x1d0
[   37.019617]  mtd_write+0xb8/0x12c
[   37.022953]  mtdchar_write+0x224/0x47c
[   37.026732]  vfs_write+0x1e4/0x8c8
[   37.030163]  ksys_write+0xec/0x1d0
[   37.033586]  __arm64_sys_write+0x6c/0x9c
[   37.037539]  invoke_syscall+0x6c/0x258
[   37.041327]  el0_svc_common.constprop.0+0x160/0x22c
[   37.046244]  do_el0_svc+0x44/0x5c
[   37.049589]  el0_svc+0x38/0x78
[   37.052681]  el0t_64_sync_handler+0x13c/0x158
[   37.057077]  el0t_64_sync+0x190/0x194
[   37.060775]
[   37.062274] Allocated by task 455:
[   37.065701]  kasan_save_stack+0x2c/0x54
[   37.069570]  kasan_save_track+0x20/0x3c
[   37.073438]  kasan_save_alloc_info+0x40/0x54
[   37.077736]  __kasan_kmalloc+0xa0/0xb8
[   37.081515]  __kmalloc_noprof+0x158/0x2f8
[   37.085563]  mtd_kmalloc_up_to+0x120/0x154
[   37.089690]  mtdchar_write+0x130/0x47c
[   37.093469]  vfs_write+0x1e4/0x8c8
[   37.096901]  ksys_write+0xec/0x1d0
[   37.100332]  __arm64_sys_write+0x6c/0x9c
[   37.104287]  invoke_syscall+0x6c/0x258
[   37.108064]  el0_svc_common.constprop.0+0x160/0x22c
[   37.112972]  do_el0_svc+0x44/0x5c
[   37.116319]  el0_svc+0x38/0x78
[   37.119401]  el0t_64_sync_handler+0x13c/0x158
[   37.123788]  el0t_64_sync+0x190/0x194
[   37.127474]
[   37.128977] The buggy address belongs to the object at ffff00081037c2a0
[   37.128977]  which belongs to the cache kmalloc-8 of size 8
[   37.141177] The buggy address is located 0 bytes inside of
[   37.141177]  allocated 3-byte region [ffff00081037c2a0, ffff00081037c2a3)
[   37.153465]
[   37.154971] The buggy address belongs to the physical page:
[   37.160559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89037c
[   37.168596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.175149] page_type: 0xfdffffff(slab)
[   37.179021] raw: 0bfffe0000000000 ffff000800002500 dead000000000122 0000000000000000
[   37.186788] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000
[   37.194553] page dumped because: kasan: bad access detected
[   37.200144]
[   37.201647] Memory state around the buggy address:
[   37.206460]  ffff00081037c180: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
[   37.213701]  ffff00081037c200: fa fc fc fc 05 fc fc fc 03 fc fc fc 02 fc fc fc
[   37.220946] &gt;ffff00081037c280: 06 fc fc fc 03 fc fc fc fc fc fc fc fc fc fc fc
[   37.228186]                                ^
[   37.232473]  ffff00081037c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.239718]  ffff00081037c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.246962] ==============================================================
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231083">SUSE bug 1231083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46854</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dpaa: Pad packets to ETH_ZLEN

When sending packets under 60 bytes, up to three bytes of the buffer
following the data may be leaked. Avoid this by extending all packets to
ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be
reproduced by running

	$ ping -s 11 destination
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231084">SUSE bug 1231084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_socket: fix sk refcount leaks

We must put 'sk' reference before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231085">SUSE bug 1231085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46857</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix bridge mode operations when there are no VFs

Currently, trying to set the bridge mode attribute when numvfs=0 leads to a
crash:

bridge link set dev eth2 hwmode vepa

[  168.967392] BUG: kernel NULL pointer dereference, address: 0000000000000030
[...]
[  168.969989] RIP: 0010:mlx5_add_flow_rules+0x1f/0x300 [mlx5_core]
[...]
[  168.976037] Call Trace:
[  168.976188]  &lt;TASK&gt;
[  168.978620]  _mlx5_eswitch_set_vepa_locked+0x113/0x230 [mlx5_core]
[  168.979074]  mlx5_eswitch_set_vepa+0x7f/0xa0 [mlx5_core]
[  168.979471]  rtnl_bridge_setlink+0xe9/0x1f0
[  168.979714]  rtnetlink_rcv_msg+0x159/0x400
[  168.980451]  netlink_rcv_skb+0x54/0x100
[  168.980675]  netlink_unicast+0x241/0x360
[  168.980918]  netlink_sendmsg+0x1f6/0x430
[  168.981162]  ____sys_sendmsg+0x3bb/0x3f0
[  168.982155]  ___sys_sendmsg+0x88/0xd0
[  168.985036]  __sys_sendmsg+0x59/0xa0
[  168.985477]  do_syscall_64+0x79/0x150
[  168.987273]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  168.987773] RIP: 0033:0x7f8f7950f917

(esw-&gt;fdb_table.legacy.vepa_fdb is null)

The bridge mode is only relevant when there are multiple functions per
port. Therefore, prevent setting and getting this setting when there are no
VFs.

Note that after this change, there are no settings to change on the PF
interface using `bridge link` when there are no VFs, so the interface no
longer appears in the `bridge link` output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231087">SUSE bug 1231087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46859</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses

The panasonic laptop code in various places uses the SINF array with index
values of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SINF array
is big enough.

Not all panasonic laptops have this many SINF array entries, for example
the Toughbook CF-18 model only has 10 SINF array entries. So it only
supports the AC+DC brightness entries and mute.

Check that the SINF array has a minimum size which covers all AC+DC
brightness entries and refuse to load if the SINF array is smaller.

For higher SINF indexes hide the sysfs attributes when the SINF array
does not contain an entry for that attribute, avoiding show()/store()
accessing the array out of bounds and add bounds checking to the probe()
and resume() code accessing these.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231089">SUSE bug 1231089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46864</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: fix kexec crash due to VP assist page corruption

commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when
CPUs go online/offline") introduces a new cpuhp state for hyperv
initialization.

cpuhp_setup_state() returns the state number if state is
CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.
For the hyperv case, since a new cpuhp state was introduced it would
return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call
is conditioned upon "hyperv_init_cpuhp &gt; 0". This will never be true and
so hv_cpu_die() won't be called on all CPUs. This means the VP assist page
won't be reset. When the kexec kernel tries to setup the VP assist page
again, the hypervisor corrupts the memory region of the old VP assist page
causing a panic in case the kexec kernel is using that memory elsewhere.
This was originally fixed in commit dfe94d4086e4 ("x86/hyperv: Fix kexec
panic/hang issues").

Get rid of hyperv_init_cpuhp entirely since we are no longer using a
dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with
cpuhp_remove_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231108">SUSE bug 1231108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX

[Why &amp; How]
It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller
number to create array dmub_callback &amp; dmub_thread_offload has potential to access
item out of array bound. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231434">SUSE bug 1231434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4741</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2036-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2051-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018839.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause
memory to be accessed that was previously freed in some situations

Impact summary: A use after free can have a range of potential consequences such
as the corruption of valid data, crashes or execution of arbitrary code.
However, only applications that directly call the SSL_free_buffers function are
affected by this issue. Applications that do not call this function are not
vulnerable. Our investigations indicate that this function is rarely used by
applications.

The SSL_free_buffers function is used to free the internal OpenSSL buffer used
when processing an incoming record from the network. The call is only expected
to succeed if the buffer is not currently in use. However, two scenarios have
been identified where the buffer is freed even when still in use.

The first scenario occurs where a record header has been received from the
network and processed by OpenSSL, but the full record body has not yet arrived.
In this case calling SSL_free_buffers will succeed even though a record has only
been partially processed and the buffer is still in use.

The second scenario occurs where a full record containing application data has
been received and processed by OpenSSL but the application has only read part of
this data. Again a call to SSL_free_buffers will succeed even though the buffer
is still in use.

While these scenarios could occur accidentally during normal operation a
malicious attacker could attempt to engineer a stituation where this occurs.
We are not aware of this issue being actively exploited.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225552">SUSE bug 1225552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868180" comment="libopenssl-1_1-devel-1.1.1l-150500.17.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868181" comment="libopenssl1_1-1.1.1l-150500.17.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868182" comment="libopenssl1_1-hmac-1.1.1l-150500.17.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009868183" comment="openssl-1_1-1.1.1l-150500.17.31.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47660</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsnotify: clear PARENT_WATCHED flags lazily

In some setups directories can have many (usually negative) dentries.
Hence __fsnotify_update_child_dentry_flags() function can take a
significant amount of time. Since the bulk of this function happens
under inode-&gt;i_lock this causes a significant contention on the lock
when we remove the watch from the directory as the
__fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask()
races with __fsnotify_update_child_dentry_flags() calls from
__fsnotify_parent() happening on children. This can lead upto softlockup
reports reported by users.

Fix the problem by calling fsnotify_update_children_dentry_flags() to
set PARENT_WATCHED flags only when parent starts watching children.

When parent stops watching children, clear false positive PARENT_WATCHED
flags lazily in __fsnotify_parent() for each accessed child.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231439">SUSE bug 1231439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid overflow from uint32_t to uint8_t

[WHAT &amp; HOW]
dmub_rb_cmd's ramping_boundary has size of uint8_t and it is assigned
0xFFFF. Fix it by changing it to uint8_t with value of 0xFF.

This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231496">SUSE bug 1231496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47663</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: iio: frequency: ad9834: Validate frequency parameter value

In ad9834_write_frequency() clk_get_rate() can return 0. In such case
ad9834_calc_freqreg() call will lead to division by zero. Checking
'if (fout &gt; (clk_freq / 2))' doesn't protect in case of 'fout' is 0.
ad9834_write_frequency() is called from ad9834_write(), where fout is
taken from text buffer, which can contain any value.

Modify parameters checking.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231441">SUSE bug 1231441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47664</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware

If the value of max_speed_hz is 0, it may cause a division by zero
error in hisi_calc_effective_speed().
The value of max_speed_hz is provided by firmware.
Firmware is generally considered as a trusted domain. However, as
division by zero errors can cause system failure, for defense measure,
the value of max_speed is validated here. So 0 is regarded as invalid
and an error code is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231442">SUSE bug 1231442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47665</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup

Definitely condition dma_get_cache_alignment * defined value &gt; 256
during driver initialization is not reason to BUG_ON(). Turn that to
graceful error out with -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231452">SUSE bug 1231452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47667</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)

Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0
(SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an
inbound PCIe TLP spans more than two internal AXI 128-byte bursts,
the bus may corrupt the packet payload and the corrupt data may
cause associated applications or the processor to hang.

The workaround for Errata #i2037 is to limit the maximum read
request size and maximum payload size to 128 bytes. Add workaround
for Errata #i2037 here.

The errata and workaround is applicable only to AM65x SR 1.0 and
later versions of the silicon will have this fixed.

[1] -&gt; https://www.ti.com/lit/er/sprz452i/sprz452i.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231481">SUSE bug 1231481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47668</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()

If we need to increase the tree depth, allocate a new node, and then
race with another thread that increased the tree depth before us, we'll
still have a preallocated node that might be used later.

If we then use that node for a new non-root node, it'll still have a
pointer to the old root instead of being zeroed - fix this by zeroing it
in the cmpxchg failure path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47669</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47669" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47669" ref_url="https://www.suse.com/security/cve/CVE-2024-47669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix state management in error path of log writing function

After commit a694291a6211 ("nilfs2: separate wait function from
nilfs_segctor_write") was applied, the log writing function
nilfs_segctor_do_construct() was able to issue I/O requests continuously
even if user data blocks were split into multiple logs across segments,
but two potential flaws were introduced in its error handling.

First, if nilfs_segctor_begin_construction() fails while creating the
second or subsequent logs, the log writing function returns without
calling nilfs_segctor_abort_construction(), so the writeback flag set on
pages/folios will remain uncleared.  This causes page cache operations to
hang waiting for the writeback flag.  For example,
truncate_inode_pages_final(), which is called via nilfs_evict_inode() when
an inode is evicted from memory, will hang.

Second, the NILFS_I_COLLECTED flag set on normal inodes remain uncleared. 
As a result, if the next log write involves checkpoint creation, that's
fine, but if a partial log write is performed that does not, inodes with
NILFS_I_COLLECTED set are erroneously removed from the "sc_dirty_files"
list, and their data and b-tree blocks may not be written to the device,
corrupting the block mapping.

Fix these issues by uniformly calling nilfs_segctor_abort_construction()
on failure of each step in the loop in nilfs_segctor_do_construct(),
having it clean up logs and segment usages according to progress, and
correcting the conditions for calling nilfs_redirty_inodes() to ensure
that the NILFS_I_COLLECTED flag is cleared.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47669/">CVE-2024-47669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231474">SUSE bug 1231474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47670</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47670" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47670" ref_url="https://www.suse.com/security/cve/CVE-2024-47670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: add bounds checking to ocfs2_xattr_find_entry()

Add a paranoia check to make sure it doesn't stray beyond valid memory
region containing ocfs2 xattr entries when scanning for a match.  It will
prevent out-of-bound access in case of crafted images.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47670/">CVE-2024-47670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47670">CVE-2024-47670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231537">SUSE bug 1231537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47671</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: usbtmc: prevent kernel-usb-infoleak

The syzbot reported a kernel-usb-infoleak in usbtmc_write,
we need to clear the structure before filling fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231541">SUSE bug 1231541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47672</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47672" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47672" ref_url="https://www.suse.com/security/cve/CVE-2024-47672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't wait for tx queues if firmware is dead

There is a WARNING in iwl_trans_wait_tx_queues_empty() (that was
recently converted from just a message), that can be hit if we
wait for TX queues to become empty after firmware died. Clearly,
we can't expect anything from the firmware after it's declared dead.

Don't call iwl_trans_wait_tx_queues_empty() in this case. While it could
be a good idea to stop the flow earlier, the flush functions do some
maintenance work that is not related to the firmware, so keep that part
of the code running even when the firmware is not running.

[edit commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47672/">CVE-2024-47672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47672">CVE-2024-47672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231540">SUSE bug 1231540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47673</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47673" ref_url="https://www.suse.com/security/cve/CVE-2024-47673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: pause TCM when the firmware is stopped

Not doing so will make us send a host command to the transport while the
firmware is not alive, which will trigger a WARNING.

bad state = 0
WARNING: CPU: 2 PID: 17434 at drivers/net/wireless/intel/iwlwifi/iwl-trans.c:115 iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]
RIP: 0010:iwl_trans_send_cmd+0x1cb/0x1e0 [iwlwifi]
Call Trace:
 &lt;TASK&gt;
 iwl_mvm_send_cmd+0x40/0xc0 [iwlmvm]
 iwl_mvm_config_scan+0x198/0x260 [iwlmvm]
 iwl_mvm_recalc_tcm+0x730/0x11d0 [iwlmvm]
 iwl_mvm_tcm_work+0x1d/0x30 [iwlmvm]
 process_one_work+0x29e/0x640
 worker_thread+0x2df/0x690
 ? rescuer_thread+0x540/0x540
 kthread+0x192/0x1e0
 ? set_kthread_struct+0x90/0x90
 ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47673/">CVE-2024-47673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47673">CVE-2024-47673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231539">SUSE bug 1231539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47674</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47674" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: avoid leaving partial pfn mappings around in error case

As Jann points out, PFN mappings are special, because unlike normal
memory mappings, there is no lifetime information associated with the
mapping - it is just a raw mapping of PFNs with no reference counting of
a 'struct page'.

That's all very much intentional, but it does mean that it's easy to
mess up the cleanup in case of errors.  Yes, a failed mmap() will always
eventually clean up any partial mappings, but without any explicit
lifetime in the page table mapping itself, it's very easy to do the
error handling in the wrong order.

In particular, it's easy to mistakenly free the physical backing store
before the page tables are actually cleaned up and (temporarily) have
stale dangling PTE entries.

To make this situation less error-prone, just make sure that any partial
pfn mapping is torn down early, before any other error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231676">SUSE bug 1231676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47679</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfs: fix race between evice_inodes() and find_inode()&amp;iput()

Hi, all

Recently I noticed a bug[1] in btrfs, after digged it into
and I believe it'a race in vfs.

Let's assume there's a inode (ie ino 261) with i_count 1 is
called by iput(), and there's a concurrent thread calling
generic_shutdown_super().

cpu0:                              cpu1:
iput() // i_count is 1
  -&gt;spin_lock(inode)
  -&gt;dec i_count to 0
  -&gt;iput_final()                    generic_shutdown_super()
    -&gt;__inode_add_lru()               -&gt;evict_inodes()
      // cause some reason[2]           -&gt;if (atomic_read(inode-&gt;i_count)) continue;
      // return before                  // inode 261 passed the above check
      // list_lru_add_obj()             // and then schedule out
   -&gt;spin_unlock()
// note here: the inode 261
// was still at sb list and hash list,
// and I_FREEING|I_WILL_FREE was not been set

btrfs_iget()
  // after some function calls
  -&gt;find_inode()
    // found the above inode 261
    -&gt;spin_lock(inode)
   // check I_FREEING|I_WILL_FREE
   // and passed
      -&gt;__iget()
    -&gt;spin_unlock(inode)                // schedule back
                                        -&gt;spin_lock(inode)
                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,
                                        // passed and set I_FREEING
iput()                                  -&gt;spin_unlock(inode)
  -&gt;spin_lock(inode)			  -&gt;evict()
  // dec i_count to 0
  -&gt;iput_final()
    -&gt;spin_unlock()
    -&gt;evict()

Now, we have two threads simultaneously evicting
the same inode, which may trigger the BUG(inode-&gt;i_state &amp; I_CLEAR)
statement both within clear_inode() and iput().

To fix the bug, recheck the inode-&gt;i_count after holding i_lock.
Because in the most scenarios, the first check is valid, and
the overhead of spin_lock() can be reduced.

If there is any misunderstanding, please let me know, thanks.

[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/
[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()
return false when I reproduced the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231930">SUSE bug 1231930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47682</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sd: Fix off-by-one error in sd_read_block_characteristics()

Ff the device returns page 0xb1 with length 8 (happens with qemu v2.x, for
example), sd_read_block_characteristics() may attempt an out-of-bounds
memory access when accessing the zoned field at offset 8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231856">SUSE bug 1231856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47684</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47684" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: check skb is non-NULL in tcp_rto_delta_us()

We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic
kernel that are running ceph and recently hit a null ptr dereference in
tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also
saw it getting hit from the RACK case as well. Here are examples of the oops
messages we saw in each of those cases:

Jul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020
Jul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode
Jul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page
Jul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0
Jul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI
Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu
Jul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023
Jul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160
Jul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 &lt;48&gt; 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3
Jul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246
Jul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000
Jul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60
Jul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8
Jul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900
Jul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30
Jul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000
Jul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Jul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0
Jul 26 15:05:02 rx [11061395.913822] PKRU: 55555554
Jul 26 15:05:02 rx [11061395.916786] Call Trace:
Jul 26 15:05:02 rx [11061395.919488]
Jul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f
Jul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9
Jul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380
Jul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0
Jul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50
Jul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0
Jul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20
Jul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450
Jul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140
Jul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90
Jul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0
Jul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40
Jul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160
Jul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160
Jul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220
Jul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240
Jul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0
Jul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240
Jul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130
Jul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280
Jul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10
Jul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30
Jul 26 15:05:02 rx [11061396.017718] ? lapic_next_even
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231987">SUSE bug 1231987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231993">SUSE bug 1231993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47685</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()

syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending
garbage on the four reserved tcp bits (th-&gt;res1)

Use skb_put_zero() to clear the whole TCP header,
as done in nf_reject_ip_tcphdr_put()

BUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255
  nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255
  nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344
  nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5661 [inline]
  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775
  process_backlog+0x4ad/0xa50 net/core/dev.c:6108
  __napi_poll+0xe7/0x980 net/core/dev.c:6772
  napi_poll net/core/dev.c:6841 [inline]
  net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963
  handle_softirqs+0x1ce/0x800 kernel/softirq.c:554
  __do_softirq+0x14/0x1a kernel/softirq.c:588
  do_softirq+0x9a/0x100 kernel/softirq.c:455
  __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382
  local_bh_enable include/linux/bottom_half.h:33 [inline]
  rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]
  __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450
  dev_queue_xmit include/linux/netdevice.h:3105 [inline]
  neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565
  neigh_output include/net/neighbour.h:542 [inline]
  ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141
  __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]
  ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226
  NF_HOOK_COND include/linux/netfilter.h:303 [inline]
  ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247
  dst_output include/net/dst.h:450 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366
  inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135
  __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466
  tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]
  tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143
  tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333
  __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679
  inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750
  __sys_connect_file net/socket.c:2061 [inline]
  __sys_connect+0x606/0x690 net/socket.c:2078
  __do_sys_connect net/socket.c:2088 [inline]
  __se_sys_connect net/socket.c:2085 [inline]
  __x64_sys_connect+0x91/0xe0 net/socket.c:2085
  x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was stored to memory at:
  nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249
  nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344
  nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231998">SUSE bug 1231998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47692</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: return -EINVAL when namelen is 0

When we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may
result in namelen being 0, which will cause memdup_user() to return
ZERO_SIZE_PTR.
When we access the name.data that has been assigned the value of
ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is
triggered.

[ T1205] ==================================================================
[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260
[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205
[ T1205]
[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406
[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014
[ T1205] Call Trace:
[ T1205]  dump_stack+0x9a/0xd0
[ T1205]  ? nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  __kasan_report.cold+0x34/0x84
[ T1205]  ? nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  kasan_report+0x3a/0x50
[ T1205]  nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  ? nfsd4_release_lockowner+0x410/0x410
[ T1205]  cld_pipe_downcall+0x5ca/0x760
[ T1205]  ? nfsd4_cld_tracking_exit+0x1d0/0x1d0
[ T1205]  ? down_write_killable_nested+0x170/0x170
[ T1205]  ? avc_policy_seqno+0x28/0x40
[ T1205]  ? selinux_file_permission+0x1b4/0x1e0
[ T1205]  rpc_pipe_write+0x84/0xb0
[ T1205]  vfs_write+0x143/0x520
[ T1205]  ksys_write+0xc9/0x170
[ T1205]  ? __ia32_sys_read+0x50/0x50
[ T1205]  ? ktime_get_coarse_real_ts64+0xfe/0x110
[ T1205]  ? ktime_get_coarse_real_ts64+0xa2/0x110
[ T1205]  do_syscall_64+0x33/0x40
[ T1205]  entry_SYSCALL_64_after_hwframe+0x67/0xd1
[ T1205] RIP: 0033:0x7fdbdb761bc7
[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 514
[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7
[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008
[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001
[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b
[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000
[ T1205] ==================================================================

Fix it by checking namelen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231857">SUSE bug 1231857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47693</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix ib_cache_setup_one error flow cleanup

When ib_cache_update return an error, we exit ib_cache_setup_one
instantly with no proper cleanup, even though before this we had
already successfully done gid_table_setup_one, that results in
the kernel WARN below.

Do proper cleanup using gid_table_cleanup_one before returning
the err in order to fix the issue.

WARNING: CPU: 4 PID: 922 at drivers/infiniband/core/cache.c:806 gid_table_release_one+0x181/0x1a0
Modules linked in:
CPU: 4 UID: 0 PID: 922 Comm: c_repro Not tainted 6.11.0-rc1+ #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:gid_table_release_one+0x181/0x1a0
Code: 44 8b 38 75 0c e8 2f cb 34 ff 4d 8b b5 28 05 00 00 e8 23 cb 34 ff 44 89 f9 89 da 4c 89 f6 48 c7 c7 d0 58 14 83 e8 4f de 21 ff &lt;0f&gt; 0b 4c 8b 75 30 e9 54 ff ff ff 48 8    3 c4 10 5b 5d 41 5c 41 5d 41
RSP: 0018:ffffc90002b835b0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c8527
RDX: 0000000000000000 RSI: ffffffff811c8534 RDI: 0000000000000001
RBP: ffff8881011b3d00 R08: ffff88810b3abe00 R09: 205d303839303631
R10: 666572207972746e R11: 72746e6520444947 R12: 0000000000000001
R13: ffff888106390000 R14: ffff8881011f2110 R15: 0000000000000001
FS:  00007fecc3b70800(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000340 CR3: 000000010435a001 CR4: 00000000003706b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x94/0xa0
 ? __warn+0x9e/0x1c0
 ? gid_table_release_one+0x181/0x1a0
 ? report_bug+0x1f9/0x340
 ? gid_table_release_one+0x181/0x1a0
 ? handle_bug+0xa2/0x110
 ? exc_invalid_op+0x31/0xa0
 ? asm_exc_invalid_op+0x16/0x20
 ? __warn_printk+0xc7/0x180
 ? __warn_printk+0xd4/0x180
 ? gid_table_release_one+0x181/0x1a0
 ib_device_release+0x71/0xe0
 ? __pfx_ib_device_release+0x10/0x10
 device_release+0x44/0xd0
 kobject_put+0x135/0x3d0
 put_device+0x20/0x30
 rxe_net_add+0x7d/0xa0
 rxe_newlink+0xd7/0x190
 nldev_newlink+0x1b0/0x2a0
 ? __pfx_nldev_newlink+0x10/0x10
 rdma_nl_rcv_msg+0x1ad/0x2e0
 rdma_nl_rcv_skb.constprop.0+0x176/0x210
 netlink_unicast+0x2de/0x400
 netlink_sendmsg+0x306/0x660
 __sock_sendmsg+0x110/0x120
 ____sys_sendmsg+0x30e/0x390
 ___sys_sendmsg+0x9b/0xf0
 ? kstrtouint+0x6e/0xa0
 ? kstrtouint_from_user+0x7c/0xb0
 ? get_pid_task+0xb0/0xd0
 ? proc_fail_nth_write+0x5b/0x140
 ? __fget_light+0x9a/0x200
 ? preempt_count_add+0x47/0xa0
 __sys_sendmsg+0x61/0xd0
 do_syscall_64+0x50/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232013">SUSE bug 1232013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47695</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds

In the function init_conns(), after the create_con() and create_cm() for
loop if something fails. In the cleanup for loop after the destroy tag, we
access out of bound memory because cid is set to clt_path-&gt;s.con_num.

This commits resets the cid to clt_path-&gt;s.con_num - 1, to stay in bounds
in the cleanup loop later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231931">SUSE bug 1231931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47696</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency

In the commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to
destroying CM IDs"), the function flush_workqueue is invoked to flush the
work queue iwcm_wq.

But at that time, the work queue iwcm_wq was created via the function
alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.

Because the current process is trying to flush the whole iwcm_wq, if
iwcm_wq doesn't have the flag WQ_MEM_RECLAIM, verify that the current
process is not reclaiming memory or running on a workqueue which doesn't
have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee
leading to a deadlock.

The call trace is as below:

[  125.350876][ T1430] Call Trace:
[  125.356281][ T1430]  &lt;TASK&gt;
[ 125.361285][ T1430] ? __warn (kernel/panic.c:693)
[ 125.367640][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.375689][ T1430] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[ 125.382505][ T1430] ? handle_bug (arch/x86/kernel/traps.c:239)
[ 125.388987][ T1430] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[ 125.395831][ T1430] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)
[ 125.403125][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.410984][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.418764][ T1430] __flush_workqueue (kernel/workqueue.c:3970)
[ 125.426021][ T1430] ? __pfx___might_resched (kernel/sched/core.c:10151)
[ 125.433431][ T1430] ? destroy_cm_id (drivers/infiniband/core/iwcm.c:375) iw_cm
[ 125.441209][ T1430] ? __pfx___flush_workqueue (kernel/workqueue.c:3910)
[ 125.473900][ T1430] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:107 include/linux/atomic/atomic-arch-fallback.h:2170 include/linux/atomic/atomic-instrumented.h:1302 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:187 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)
[ 125.473909][ T1430] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161)
[ 125.482537][ T1430] _destroy_id (drivers/infiniband/core/cma.c:2044) rdma_cm
[ 125.495072][ T1430] nvme_rdma_free_queue (drivers/nvme/host/rdma.c:656 drivers/nvme/host/rdma.c:650) nvme_rdma
[ 125.505827][ T1430] nvme_rdma_reset_ctrl_work (drivers/nvme/host/rdma.c:2180) nvme_rdma
[ 125.505831][ T1430] process_one_work (kernel/workqueue.c:3231)
[ 125.515122][ T1430] worker_thread (kernel/workqueue.c:3306 kernel/workqueue.c:3393)
[ 125.515127][ T1430] ? __pfx_worker_thread (kernel/workqueue.c:3339)
[ 125.531837][ T1430] kthread (kernel/kthread.c:389)
[ 125.539864][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.550628][ T1430] ret_from_fork (arch/x86/kernel/process.c:147)
[ 125.558840][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.558844][ T1430] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)
[  125.566487][ T1430]  &lt;/TASK&gt;
[  125.566488][ T1430] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231864">SUSE bug 1231864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47697</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47697" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error

Ensure index in rtl2830_pid_filter does not exceed 31 to prevent
out-of-bounds access.

dev-&gt;filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index &gt; 32 to index &gt;= 32 to resolve this
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231858">SUSE bug 1231858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47698</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47698" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error

Ensure index in rtl2832_pid_filter does not exceed 31 to prevent
out-of-bounds access.

dev-&gt;filters is a 32-bit value, so set_bit and clear_bit functions should
only operate on indices from 0 to 31. If index is 32, it will attempt to
access a non-existent 33rd bit, leading to out-of-bounds access.
Change the boundary check from index &gt; 32 to index &gt;= 32 to resolve this
issue.

[hverkuil: added fixes tag, rtl2830_pid_filter -&gt; rtl2832_pid_filter in logmsg]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231859">SUSE bug 1231859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47699</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47699" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()

Patch series "nilfs2: fix potential issues with empty b-tree nodes".

This series addresses three potential issues with empty b-tree nodes that
can occur with corrupted filesystem images, including one recently
discovered by syzbot.


This patch (of 3):

If a b-tree is broken on the device, and the b-tree height is greater than
2 (the level of the root node is greater than 1) even if the number of
child nodes of the b-tree root is 0, a NULL pointer dereference occurs in
nilfs_btree_prepare_insert(), which is called from nilfs_btree_insert().

This is because, when the number of child nodes of the b-tree root is 0,
nilfs_btree_do_lookup() does not set the block buffer head in any of
path[x].bp_bh, leaving it as the initial value of NULL, but if the level
of the b-tree root node is greater than 1, nilfs_btree_get_nonroot_node(),
which accesses the buffer memory of path[x].bp_bh, is called.

Fix this issue by adding a check to nilfs_btree_root_broken(), which
performs sanity checks when reading the root node from the device, to
detect this inconsistency.

Thanks to Lizhi Xu for trying to solve the bug and clarifying the cause
early on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231916">SUSE bug 1231916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47701</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47701" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid OOB when system.data xattr changes underneath the filesystem

When looking up for an entry in an inlined directory, if e_value_offs is
changed underneath the filesystem by some change in the block device, it
will lead to an out-of-bounds access that KASAN detects as an UAF.

EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
loop0: detected capacity change from 2048 to 2047
==================================================================
BUG: KASAN: use-after-free in ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500
Read of size 1 at addr ffff88803e91130f by task syz-executor269/5103

CPU: 0 UID: 0 PID: 5103 Comm: syz-executor269 Not tainted 6.11.0-rc4-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 ext4_search_dir+0xf2/0x1c0 fs/ext4/namei.c:1500
 ext4_find_inline_entry+0x4be/0x5e0 fs/ext4/inline.c:1697
 __ext4_find_entry+0x2b4/0x1b30 fs/ext4/namei.c:1573
 ext4_lookup_entry fs/ext4/namei.c:1727 [inline]
 ext4_lookup+0x15f/0x750 fs/ext4/namei.c:1795
 lookup_one_qstr_excl+0x11f/0x260 fs/namei.c:1633
 filename_create+0x297/0x540 fs/namei.c:3980
 do_symlinkat+0xf9/0x3a0 fs/namei.c:4587
 __do_sys_symlinkat fs/namei.c:4610 [inline]
 __se_sys_symlinkat fs/namei.c:4607 [inline]
 __x64_sys_symlinkat+0x95/0xb0 fs/namei.c:4607
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3e73ced469
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff4d40c258 EFLAGS: 00000246 ORIG_RAX: 000000000000010a
RAX: ffffffffffffffda RBX: 0032656c69662f2e RCX: 00007f3e73ced469
RDX: 0000000020000200 RSI: 00000000ffffff9c RDI: 00000000200001c0
RBP: 0000000000000000 R08: 00007fff4d40c290 R09: 00007fff4d40c290
R10: 0023706f6f6c2f76 R11: 0000000000000246 R12: 00007fff4d40c27c
R13: 0000000000000003 R14: 431bde82d7b634db R15: 00007fff4d40c2b0
 &lt;/TASK&gt;

Calling ext4_xattr_ibody_find right after reading the inode with
ext4_get_inode_loc will lead to a check of the validity of the xattrs,
avoiding this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231920">SUSE bug 1231920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47704</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it

[WHAT &amp; HOW]
Functions dp_enable_link_phy and dp_disable_link_phy can pass link_res
without initializing hpo_dp_link_enc and it is necessary to check for
null before dereferencing.

This fixes 2 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231944">SUSE bug 1231944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47705</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix potential invalid pointer dereference in blk_add_partition

The blk_add_partition() function initially used a single if-condition
(IS_ERR(part)) to check for errors when adding a partition. This was
modified to handle the specific case of -ENXIO separately, allowing the
function to proceed without logging the error in this case. However,
this change unintentionally left a path where md_autodetect_dev()
could be called without confirming that part is a valid pointer.

This commit separates the error handling logic by splitting the
initial if-condition, improving code readability and handling specific
error scenarios explicitly. The function now distinguishes the general
error case from -ENXIO without altering the existing behavior of
md_autodetect_dev() calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231872">SUSE bug 1231872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47706</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47706" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain

1) initial state, three tasks:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
		  |  Λ            |  Λ		  |  Λ
		  |  |            |  |		  |  |
		  V  |            V  |		  V  |
		  bfqq1           bfqq2		  bfqq3
process ref:	   1		    1		    1

2) bfqq1 merged to bfqq2:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
		  |               |		  |  Λ
		  \--------------\|		  |  |
		                  V		  V  |
		  bfqq1---------&gt;bfqq2		  bfqq3
process ref:	   0		    2		    1

3) bfqq2 merged to bfqq3:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
	 here -&gt; Λ                |		  |
		  \--------------\ \-------------\|
		                  V		  V
		  bfqq1---------&gt;bfqq2----------&gt;bfqq3
process ref:	   0		    1		    3

In this case, IO from Process 1 will get bfqq2 from BIC1 first, and then
get bfqq3 through merge chain, and finially handle IO by bfqq3.
Howerver, current code will think bfqq2 is owned by BIC1, like initial
state, and set bfqq2-&gt;bic to BIC1.

bfq_insert_request
-&gt; by Process 1
 bfqq = bfq_init_rq(rq)
  bfqq = bfq_get_bfqq_handle_split
   bfqq = bic_to_bfqq
   -&gt; get bfqq2 from BIC1
 bfqq-&gt;ref++
 rq-&gt;elv.priv[0] = bic
 rq-&gt;elv.priv[1] = bfqq
 if (bfqq_process_refs(bfqq) == 1)
  bfqq-&gt;bic = bic
  -&gt; record BIC1 to bfqq2

  __bfq_insert_request
   new_bfqq = bfq_setup_cooperator
   -&gt; get bfqq3 from bfqq2-&gt;new_bfqq
   bfqq_request_freed(bfqq)
   new_bfqq-&gt;ref++
   rq-&gt;elv.priv[1] = new_bfqq
   -&gt; handle IO by bfqq3

Fix the problem by checking bfqq is from merge chain fist. And this
might fix a following problem reported by our syzkaller(unreproducible):

==================================================================
BUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]
BUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]
BUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889
Write of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595

CPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G             L     6.6.0-07439-gba2303cacfda #6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Workqueue: kblockd blk_mq_requeue_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0x10d/0x610 mm/kasan/report.c:475
 kasan_report+0x8e/0xc0 mm/kasan/report.c:588
 bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]
 bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]
 bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889
 bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757
 bfq_init_rq block/bfq-iosched.c:6876 [inline]
 bfq_insert_request block/bfq-iosched.c:6254 [inline]
 bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304
 blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593
 blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502
 process_one_work kernel/workqueue.c:2627 [inline]
 process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700
 worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781
 kthread+0x33c/0x440 kernel/kthread.c:388
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305
 &lt;/TASK&gt;

Allocated by task 20776:
 kasan_save_stack+0x20/0x40 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328
 kasan_slab_alloc include/linux/kasan.h:188 [inline]
 slab_post_alloc_hook mm/slab.h:763 [inline]
 slab_alloc_node mm/slub.c:3458 [inline]
 kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503
 ioc_create_icq block/blk-ioc.c:370 [inline]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231943">SUSE bug 1231943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47707</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47707" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()

Blamed commit accidentally removed a check for rt-&gt;rt6i_idev being NULL,
as spotted by syzbot:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 UID: 0 PID: 10998 Comm: syz-executor Not tainted 6.11.0-rc6-syzkaller-00208-g625403177711 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
 RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]
 RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914
Code: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df &lt;80&gt; 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06
RSP: 0018:ffffc900047374e0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0
RBP: ffffc900047375d0 R08: 0000000000000003 R09: fffff520008e6e8c
R10: dffffc0000000000 R11: fffff520008e6e8c R12: 1ffff1100fdf8f18
R13: ffff88807efc7998 R14: 0000000000000000 R15: ffff88807efc7930
FS:  0000000000000000(0000) GS:ffff8880b8900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020002a80 CR3: 0000000022f62000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  addrconf_ifdown+0x15d/0x1bd0 net/ipv6/addrconf.c:3856
 addrconf_notify+0x3cb/0x1020
  notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93
  call_netdevice_notifiers_extack net/core/dev.c:2032 [inline]
  call_netdevice_notifiers net/core/dev.c:2046 [inline]
  unregister_netdevice_many_notify+0xd81/0x1c40 net/core/dev.c:11352
  unregister_netdevice_many net/core/dev.c:11414 [inline]
  unregister_netdevice_queue+0x303/0x370 net/core/dev.c:11289
  unregister_netdevice include/linux/netdevice.h:3129 [inline]
  __tun_detach+0x6b9/0x1600 drivers/net/tun.c:685
  tun_detach drivers/net/tun.c:701 [inline]
  tun_chr_close+0x108/0x1b0 drivers/net/tun.c:3510
  __fput+0x24a/0x8a0 fs/file_table.c:422
  task_work_run+0x24f/0x310 kernel/task_work.c:228
  exit_task_work include/linux/task_work.h:40 [inline]
  do_exit+0xa2f/0x27f0 kernel/exit.c:882
  do_group_exit+0x207/0x2c0 kernel/exit.c:1031
  __do_sys_exit_group kernel/exit.c:1042 [inline]
  __se_sys_exit_group kernel/exit.c:1040 [inline]
  __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040
  x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1acc77def9
Code: Unable to access opcode bytes at 0x7f1acc77decf.
RSP: 002b:00007ffeb26fa738 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1acc77def9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043
RBP: 00007f1acc7dd508 R08: 00007ffeb26f84d7 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000003 R14: 00000000ffffffff R15: 00007ffeb26fa8e0
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
 RIP: 0010:rt6_uncached_list_flush_dev net/ipv6/route.c:177 [inline]
 RIP: 0010:rt6_disable_ip+0x33e/0x7e0 net/ipv6/route.c:4914
Code: 41 80 3c 04 00 74 0a e8 90 d0 9b f7 48 8b 7c 24 08 48 8b 07 48 89 44 24 10 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df &lt;80&gt; 3c 08 00 74 08 4c 89 f7 e8 64 d0 9b f7 48 8b 44 24 18 49 39 06
RSP: 0018:ffffc900047374e0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 1ffff1100fdf8f33 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff88807efc78c0
R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231935">SUSE bug 1231935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47709</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47709" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry().

syzbot reported a warning in bcm_release(). [0]

The blamed change fixed another warning that is triggered when
connect() is issued again for a socket whose connect()ed device has
been unregistered.

However, if the socket is just close()d without the 2nd connect(), the
remaining bo-&gt;bcm_proc_read triggers unnecessary remove_proc_entry()
in bcm_release().

Let's clear bo-&gt;bcm_proc_read after remove_proc_entry() in bcm_notify().

[0]
name '4986'
WARNING: CPU: 0 PID: 5234 at fs/proc/generic.c:711 remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Modules linked in:
CPU: 0 UID: 0 PID: 5234 Comm: syz-executor606 Not tainted 6.11.0-rc5-syzkaller-00178-g5517ae241919 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Code: ff eb 05 e8 cb 1e 5e ff 48 8b 5c 24 10 48 c7 c7 e0 f7 aa 8e e8 2a 38 8e 09 90 48 c7 c7 60 3a 1b 8c 48 89 de e8 da 42 20 ff 90 &lt;0f&gt; 0b 90 90 48 8b 44 24 18 48 c7 44 24 40 0e 36 e0 45 49 c7 04 07
RSP: 0018:ffffc9000345fa20 EFLAGS: 00010246
RAX: 2a2d0aee2eb64600 RBX: ffff888032f1f548 RCX: ffff888029431e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000345fb08 R08: ffffffff8155b2f2 R09: 1ffff1101710519a
R10: dffffc0000000000 R11: ffffed101710519b R12: ffff888011d38640
R13: 0000000000000004 R14: 0000000000000000 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcfb52722f0 CR3: 000000000e734000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 bcm_release+0x250/0x880 net/can/bcm.c:1578
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbc/0x240 net/socket.c:1421
 __fput+0x24a/0x8a0 fs/file_table.c:422
 task_work_run+0x24f/0x310 kernel/task_work.c:228
 exit_task_work include/linux/task_work.h:40 [inline]
 do_exit+0xa2f/0x27f0 kernel/exit.c:882
 do_group_exit+0x207/0x2c0 kernel/exit.c:1031
 __do_sys_exit_group kernel/exit.c:1042 [inline]
 __se_sys_exit_group kernel/exit.c:1040 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040
 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcfb51ee969
Code: Unable to access opcode bytes at 0x7fcfb51ee93f.
RSP: 002b:00007ffce0109ca8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fcfb51ee969
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 00007fcfb526f3b0 R08: ffffffffffffffb8 R09: 0000555500000000
R10: 0000555500000000 R11: 0000000000000246 R12: 00007fcfb526f3b0
R13: 0000000000000000 R14: 00007fcfb5271ee0 R15: 00007fcfb51bf160
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232048">SUSE bug 1232048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47710</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47710" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: Add a cond_resched() in sock_hash_free()

Several syzbot soft lockup reports all have in common sock_hash_free()

If a map with a large number of buckets is destroyed, we need to yield
the cpu when needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232049">SUSE bug 1232049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47712</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47712" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param

In the `wilc_parse_join_bss_param` function, the TSF field of the `ies`
structure is accessed after the RCU read-side critical section is
unlocked. According to RCU usage rules, this is illegal. Reusing this
pointer can lead to unpredictable behavior, including accessing memory
that has been updated or causing use-after-free issues.

This possible bug was identified using a static analysis tool developed
by myself, specifically designed to detect RCU-related issues.

To address this, the TSF value is now stored in a local variable
`ies_tsf` before the RCU lock is released. The `param-&gt;tsf_lo` field is
then assigned using this local variable, ensuring that the TSF value is
safely accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232017">SUSE bug 1232017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47713</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47713" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()

Since '__dev_queue_xmit()' should be called with interrupts enabled,
the following backtrace:

ieee80211_do_stop()
 ...
 spin_lock_irqsave(&amp;local-&gt;queue_stop_reason_lock, flags)
 ...
 ieee80211_free_txskb()
  ieee80211_report_used_skb()
   ieee80211_report_ack_skb()
    cfg80211_mgmt_tx_status_ext()
     nl80211_frame_tx_status()
      genlmsg_multicast_netns()
       genlmsg_multicast_netns_filtered()
        nlmsg_multicast_filtered()
	 netlink_broadcast_filtered()
	  do_one_broadcast()
	   netlink_broadcast_deliver()
	    __netlink_sendskb()
	     netlink_deliver_tap()
	      __netlink_deliver_tap_skb()
	       dev_queue_xmit()
	        __dev_queue_xmit() ; with IRQS disabled
 ...
 spin_unlock_irqrestore(&amp;local-&gt;queue_stop_reason_lock, flags)

issues the warning (as reported by syzbot reproducer):

WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120

Fix this by implementing a two-phase skb reclamation in
'ieee80211_do_stop()', where actual work is performed
outside of a section with interrupts disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232016">SUSE bug 1232016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47718</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: always wait for both firmware loading attempts

In 'rtw_wait_firmware_completion()', always wait for both (regular and
wowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'
has failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue
'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually
the wowlan one) is still in progress, causing UAF detected by KASAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232015">SUSE bug 1232015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47720</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the  dcn30_set_output_transfer_func function. Previously,
set_output_gamma was being checked for nullity at line 386, but then it
was being dereferenced without any nullity check at line 401. This
could potentially lead to a null pointer dereference error if
set_output_gamma is indeed null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a nullity check for
set_output_gamma before the call to set_output_gamma at line 401. If
set_output_gamma is null, we log an error message and do not call the
function.

This fix prevents a potential null pointer dereference error.

drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:401 dcn30_set_output_transfer_func()
error: we previously assumed 'mpc-&gt;funcs-&gt;set_output_gamma' could be null (see line 386)

drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c
    373 bool dcn30_set_output_transfer_func(struct dc *dc,
    374                                 struct pipe_ctx *pipe_ctx,
    375                                 const struct dc_stream_state *stream)
    376 {
    377         int mpcc_id = pipe_ctx-&gt;plane_res.hubp-&gt;inst;
    378         struct mpc *mpc = pipe_ctx-&gt;stream_res.opp-&gt;ctx-&gt;dc-&gt;res_pool-&gt;mpc;
    379         const struct pwl_params *params = NULL;
    380         bool ret = false;
    381
    382         /* program OGAM or 3DLUT only for the top pipe*/
    383         if (pipe_ctx-&gt;top_pipe == NULL) {
    384                 /*program rmu shaper and 3dlut in MPC*/
    385                 ret = dcn30_set_mpc_shaper_3dlut(pipe_ctx, stream);
    386                 if (ret == false &amp;&amp; mpc-&gt;funcs-&gt;set_output_gamma) {
                                            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If this is NULL

    387                         if (stream-&gt;out_transfer_func.type == TF_TYPE_HWPWL)
    388                                 params = &amp;stream-&gt;out_transfer_func.pwl;
    389                         else if (pipe_ctx-&gt;stream-&gt;out_transfer_func.type ==
    390                                         TF_TYPE_DISTRIBUTED_POINTS &amp;&amp;
    391                                         cm3_helper_translate_curve_to_hw_format(
    392                                         &amp;stream-&gt;out_transfer_func,
    393                                         &amp;mpc-&gt;blender_params, false))
    394                                 params = &amp;mpc-&gt;blender_params;
    395                          /* there are no ROM LUTs in OUTGAM */
    396                         if (stream-&gt;out_transfer_func.type == TF_TYPE_PREDEFINED)
    397                                 BREAK_TO_DEBUGGER();
    398                 }
    399         }
    400
--&gt; 401         mpc-&gt;funcs-&gt;set_output_gamma(mpc, mpcc_id, params);
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Then it will crash

    402         return ret;
    403 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232043">SUSE bug 1232043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47723</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix out-of-bounds in dbNextAG() and diAlloc()

In dbNextAG() , there is no check for the case where bmp-&gt;db_numag is
greater or same than MAXAG due to a polluted image, which causes an
out-of-bounds. Therefore, a bounds check should be added in dbMount().

And in dbNextAG(), a check for the case where agpref is greater than
bmp-&gt;db_numag should be added, so an out-of-bounds exception should be
prevented.

Additionally, a check for the case where agno is greater or same than
MAXAG should be added in diAlloc() to prevent out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232050">SUSE bug 1232050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232051">SUSE bug 1232051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47727</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Fix "in-kernel MMIO" check

TDX only supports kernel-initiated MMIO operations. The handle_mmio()
function checks if the #VE exception occurred in the kernel and rejects
the operation if it did not.

However, userspace can deceive the kernel into performing MMIO on its
behalf. For example, if userspace can point a syscall to an MMIO address,
syscall does get_user() or put_user() on it, triggering MMIO #VE. The
kernel will treat the #VE as in-kernel MMIO.

Ensure that the target MMIO address is within the kernel before decoding
instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232116">SUSE bug 1232116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47728</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47728" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error

For all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input
arguments, zero the value for the case of an error as otherwise it could leak
memory. For tracing, it is not needed given CAP_PERFMON can already read all
kernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped
in here.

Also, the MTU helpers mtu_len pointer value is being written but also read.
Technically, the MEM_UNINIT should not be there in order to always force init.
Removing MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now
implies two things actually: i) write into memory, ii) memory does not have
to be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory,
ii) memory must be initialized. This means that for bpf_*_check_mtu() we're
readding the issue we're trying to fix, that is, it would then be able to
write back into things like .rodata BPF maps. Follow-up work will rework the
MEM_UNINIT semantics such that the intent can be better expressed. For now
just clear the *mtu_len on error path which can be lifted later again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232076">SUSE bug 1232076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47730</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47730" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/qm - inject error before stopping queue

The master ooo cannot be completely closed when the
accelerator core reports memory error. Therefore, the driver
needs to inject the qm error to close the master ooo. Currently,
the qm error is injected after stopping queue, memory may be
released immediately after stopping queue, causing the device to
access the released memory. Therefore, error is injected to close master
ooo before stopping queue to ensure that the device does not access
the released memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232075">SUSE bug 1232075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47735</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47735" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled

Fix missuse of spin_lock_irq()/spin_unlock_irq() when
spin_lock_irqsave()/spin_lock_irqrestore() was hold.

This was discovered through the lock debugging, and the corresponding
log is as follows:

raw_local_irq_restore() called with IRQs enabled
WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
...
Call trace:
 warn_bogus_irq_restore+0x30/0x40
 _raw_spin_unlock_irqrestore+0x84/0xc8
 add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2]
 hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2]
 hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2]
 create_qp+0x138/0x258
 ib_create_qp_kernel+0x50/0xe8
 create_mad_qp+0xa8/0x128
 ib_mad_port_open+0x218/0x448
 ib_mad_init_device+0x70/0x1f8
 add_client_context+0xfc/0x220
 enable_device_and_get+0xd0/0x140
 ib_register_device.part.0+0xf4/0x1c8
 ib_register_device+0x34/0x50
 hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2]
 hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2]
 __hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2]
 hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232111">SUSE bug 1232111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47737</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: call cache_put if xdr_reserve_space returns NULL

If not enough buffer space available, but idmap_lookup has triggered
lookup_fn which calls cache_get and returns successfully. Then we
missed to call cache_put here which pairs with cache_get.

Reviwed-by: Jeff Layton &lt;jlayton@kernel.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232056">SUSE bug 1232056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47738</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't use rate mask for offchannel TX either

Like the commit ab9177d83c04 ("wifi: mac80211: don't use rate mask for
scanning"), ignore incorrect settings to avoid no supported rate warning
reported by syzbot.

The syzbot did bisect and found cause is commit 9df66d5b9f45 ("cfg80211:
fix default HE tx bitrate mask in 2G band"), which however corrects
bitmask of HE MCS and recognizes correctly settings of empty legacy rate
plus HE MCS rate instead of returning -EINVAL.

As suggestions [1], follow the change of SCAN TX to consider this case of
offchannel TX as well.

[1] https://lore.kernel.org/linux-wireless/6ab2dc9c3afe753ca6fdcdd1421e7a1f47e87b84.camel@sipsolutions.net/T/#m2ac2a6d2be06a37c9c47a3d8a44b4f647ed4f024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232114">SUSE bug 1232114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47739</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: use integer wrap around to prevent deadlock on seq_nr overflow

When submitting more than 2^32 padata objects to padata_do_serial, the
current sorting implementation incorrectly sorts padata objects with
overflowed seq_nr, causing them to be placed before existing objects in
the reorder list. This leads to a deadlock in the serialization process
as padata_find_next cannot match padata-&gt;seq_nr and pd-&gt;processed
because the padata instance with overflowed seq_nr will be selected
next.

To fix this, we use an unsigned integer wrap around to correctly sort
padata objects in scenarios with integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232124">SUSE bug 1232124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47742</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Block path traversal

Most firmware names are hardcoded strings, or are constructed from fairly
constrained format strings where the dynamic parts are just some hex
numbers or such.

However, there are a couple codepaths in the kernel where firmware file
names contain string components that are passed through from a device or
semi-privileged userspace; the ones I could find (not counting interfaces
that require root privileges) are:

 - lpfc_sli4_request_firmware_update() seems to construct the firmware
   filename from "ModelName", a string that was previously parsed out of
   some descriptor ("Vital Product Data") in lpfc_fill_vpd()
 - nfp_net_fw_find() seems to construct a firmware filename from a model
   name coming from nfp_hwinfo_lookup(pf-&gt;hwinfo, "nffw.partno"), which I
   think parses some descriptor that was read from the device.
   (But this case likely isn't exploitable because the format string looks
   like "netronome/nic_%s", and there shouldn't be any *folders* starting
   with "netronome/nic_". The previous case was different because there,
   the "%s" is *at the start* of the format string.)
 - module_flash_fw_schedule() is reachable from the
   ETHTOOL_MSG_MODULE_FW_FLASH_ACT netlink command, which is marked as
   GENL_UNS_ADMIN_PERM (meaning CAP_NET_ADMIN inside a user namespace is
   enough to pass the privilege check), and takes a userspace-provided
   firmware name.
   (But I think to reach this case, you need to have CAP_NET_ADMIN over a
   network namespace that a special kind of ethernet device is mapped into,
   so I think this is not a viable attack path in practice.)

Fix it by rejecting any firmware names containing ".." path components.

For what it's worth, I went looking and haven't found any USB device
drivers that use the firmware loader dangerously.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232126">SUSE bug 1232126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47745</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: call the security_mmap_file() LSM hook in remap_file_pages()

The remap_file_pages syscall handler calls do_mmap() directly, which
doesn't contain the LSM security check. And if the process has called
personality(READ_IMPLIES_EXEC) before and remap_file_pages() is called for
RW pages, this will actually result in remapping the pages to RWX,
bypassing a W^X policy enforced by SELinux.

So we should check prot by security_mmap_file LSM hook in the
remap_file_pages syscall handler before do_mmap() is called. Otherwise, it
potentially permits an attacker to bypass a W^X policy enforced by
SELinux.

The bypass is similar to CVE-2016-10044, which bypass the same thing via
AIO and can be found in [1].

The PoC:

$ cat &gt; test.c

int main(void) {
	size_t pagesz = sysconf(_SC_PAGE_SIZE);
	int mfd = syscall(SYS_memfd_create, "test", 0);
	const char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE,
		MAP_SHARED, mfd, 0);
	unsigned int old = syscall(SYS_personality, 0xffffffff);
	syscall(SYS_personality, READ_IMPLIES_EXEC | old);
	syscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0);
	syscall(SYS_personality, old);
	// show the RWX page exists even if W^X policy is enforced
	int fd = open("/proc/self/maps", O_RDONLY);
	unsigned char buf2[1024];
	while (1) {
		int ret = read(fd, buf2, 1024);
		if (ret &lt;= 0) break;
		write(1, buf2, ret);
	}
	close(fd);
}

$ gcc test.c -o test
$ ./test | grep rwx
7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (deleted)

[PM: subject line tweaks]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47747</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition

In the ether3_probe function, a timer is initialized with a callback
function ether3_ledoff, bound to &amp;prev(dev)-&gt;timer. Once the timer is
started, there is a risk of a race condition if the module or device
is removed, triggering the ether3_remove function to perform cleanup.
The sequence of operations that may lead to a UAF bug is as follows:

CPU0                                    CPU1

                      |  ether3_ledoff
ether3_remove         |
  free_netdev(dev);   |
  put_devic           |
  kfree(dev);         |
 |  ether3_outw(priv(dev)-&gt;regs.config2 |= CFG2_CTRLO, REG_CONFIG2);
                      | // use dev

Fix it by ensuring that the timer is canceled before proceeding with
the cleanup in ether3_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232146">SUSE bug 1232146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47748</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost_vdpa: assign irq bypass producer token correctly

We used to call irq_bypass_unregister_producer() in
vhost_vdpa_setup_vq_irq() which is problematic as we don't know if the
token pointer is still valid or not.

Actually, we use the eventfd_ctx as the token so the life cycle of the
token should be bound to the VHOST_SET_VRING_CALL instead of
vhost_vdpa_setup_vq_irq() which could be called by set_status().

Fixing this by setting up irq bypass producer's token when handling
VHOST_SET_VRING_CALL and un-registering the producer before calling
vhost_vring_ioctl() to prevent a possible use after free as eventfd
could have been released in vhost_vring_ioctl(). And such registering
and unregistering will only be done if DRIVER_OK is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232177">SUSE bug 1232177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47749</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cxgb4: Added NULL check for lookup_atid

The lookup_atid() function can return NULL if the ATID is
invalid or does not exist in the identifier table, which
could lead to dereferencing a null pointer without a
check in the `act_establish()` and `act_open_rpl()` functions.
Add a NULL check to prevent null pointer dereferencing.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232180">SUSE bug 1232180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47756</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Fix if-statement expression in ks_pcie_quirk()

This code accidentally uses &amp;&amp; where || was intended.  It potentially
results in a NULL dereference.

Thus, fix the if-statement expression to use the correct condition.

[kwilczynski: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232185">SUSE bug 1232185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47757</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential oob read in nilfs_btree_check_delete()

The function nilfs_btree_check_delete(), which checks whether degeneration
to direct mapping occurs before deleting a b-tree entry, causes memory
access outside the block buffer when retrieving the maximum key if the
root node has no entries.

This does not usually happen because b-tree mappings with 0 child nodes
are never created by mkfs.nilfs2 or nilfs2 itself.  However, it can happen
if the b-tree root node read from a device is configured that way, so fix
this potential issue by adding a check for that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232188">SUSE bug 1232188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47814</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47814" ref_url="https://www.suse.com/security/cve/CVE-2024-47814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020043.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. A use-after-free was found in Vim &lt; 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-47814/">CVE-2024-47814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47814">CVE-2024-47814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231373">SUSE bug 1231373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958176" comment="vim-data-common-9.1.0836-150500.20.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958237" comment="vim-small-9.1.0836-150500.20.15.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49850</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos

In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL
referencing a non-existing BTF type, function bpf_core_calc_relo_insn
would cause a null pointer deference.

Fix this by adding a proper check upper in call stack, as malformed
relocation records could be passed from user space.

Simplest reproducer is a program:

    r0 = 0
    exit

With a single relocation record:

    .insn_off = 0,          /* patch first instruction */
    .type_id = 100500,      /* this type id does not exist */
    .access_str_off = 6,    /* offset of string "0" */
    .kind = BPF_CORE_TYPE_ID_LOCAL,

See the link for original reproducer or next commit for a test case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232189">SUSE bug 1232189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49851</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command
transmission. However if the command fails no rollback of this
preparation is done. This can result in transient handles being leaked
if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission
failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232134">SUSE bug 1232134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49852</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()

The kref_put() function will call nport-&gt;release if the refcount drops to
zero.  The nport-&gt;release release function is _efc_nport_free() which frees
"nport".  But then we dereference "nport" on the next line which is a use
after free.  Re-order these lines to avoid the use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232819">SUSE bug 1232819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49855</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix race between timeout and normal completion

If request timetout is handled by nbd_requeue_cmd(), normal completion
has to be stopped for avoiding to complete this requeued request, other
use-after-free can be triggered.

Fix the race by clearing NBD_CMD_INFLIGHT in nbd_requeue_cmd(), meantime
make sure that cmd-&gt;lock is grabbed for clearing the flag and the
requeue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232195">SUSE bug 1232195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232900">SUSE bug 1232900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49858</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption

The TPM event log table is a Linux specific construct, where the data
produced by the GetEventLog() boot service is cached in memory, and
passed on to the OS using an EFI configuration table.

The use of EFI_LOADER_DATA here results in the region being left
unreserved in the E820 memory map constructed by the EFI stub, and this
is the memory description that is passed on to the incoming kernel by
kexec, which is therefore unaware that the region should be reserved.

Even though the utility of the TPM2 event log after a kexec is
questionable, any corruption might send the parsing code off into the
weeds and crash the kernel. So let's use EFI_ACPI_RECLAIM_MEMORY
instead, which is always treated as reserved by the E820 conversion
logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232251">SUSE bug 1232251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49860</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: sysfs: validate return type of _STR method

Only buffer objects are valid return values of _STR.

If something else is returned description_show() will access invalid
memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231862">SUSE bug 1231862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49861</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix helper writes to read-only maps

Lonial found an issue that despite user- and BPF-side frozen BPF map
(like in case of .rodata), it was still possible to write into it from
a BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}
as arguments.

In check_func_arg() when the argument is as mentioned, the meta-&gt;raw_mode
is never set. Later, check_helper_mem_access(), under the case of
PTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the
subsequent call to check_map_access_type() and given the BPF map is
read-only it succeeds.

The helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT
when results are written into them as opposed to read out of them. The
latter indicates that it's okay to pass a pointer to uninitialized memory
as the memory is written to anyway.

However, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM
just with additional alignment requirement. So it is better to just get
rid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the
fixed size memory types. For this, add MEM_ALIGNED to additionally ensure
alignment given these helpers write directly into the args via *&lt;ptr&gt; = val.
The .arg*_size has been initialized reflecting the actual sizeof(*&lt;ptr&gt;).

MEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated
argument types, since in !MEM_FIXED_SIZE cases the verifier does not know
the buffer size a priori and therefore cannot blindly write *&lt;ptr&gt; = val.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232254">SUSE bug 1232254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49863</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()

Since commit 3f8ca2e115e5 ("vhost/scsi: Extract common handling code
from control queue handler") a null pointer dereference bug can be
triggered when guest sends an SCSI AN request.

In vhost_scsi_ctl_handle_vq(), `vc.target` is assigned with
`&amp;v_req.tmf.lun[1]` within a switch-case block and is then passed to
vhost_scsi_get_req() which extracts `vc-&gt;req` and `tpg`. However, for
a `VIRTIO_SCSI_T_AN_*` request, tpg is not required, so `vc.target` is
set to NULL in this branch. Later, in vhost_scsi_get_req(),
`vc-&gt;target` is dereferenced without being checked, leading to a null
pointer dereference bug. This bug can be triggered from guest.

When this bug occurs, the vhost_worker process is killed while holding
`vq-&gt;mutex` and the corresponding tpg will remain occupied
indefinitely.

Below is the KASAN report:
Oops: general protection fault, probably for non-canonical address
0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 840 Comm: poc Not tainted 6.10.0+ #1
Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS
1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:vhost_scsi_get_req+0x165/0x3a0
Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 2b 02 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 65 30 4c 89 e2 48 c1 ea 03 &lt;0f&gt; b6
04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 be 01 00 00
RSP: 0018:ffff888017affb50 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88801b000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888017affcb8
RBP: ffff888017affb80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888017affc88 R14: ffff888017affd1c R15: ffff888017993000
FS:  000055556e076500(0000) GS:ffff88806b100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200027c0 CR3: 0000000010ed0004 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x86/0xa0
 ? die_addr+0x4b/0xd0
 ? exc_general_protection+0x163/0x260
 ? asm_exc_general_protection+0x27/0x30
 ? vhost_scsi_get_req+0x165/0x3a0
 vhost_scsi_ctl_handle_vq+0x2a4/0xca0
 ? __pfx_vhost_scsi_ctl_handle_vq+0x10/0x10
 ? __switch_to+0x721/0xeb0
 ? __schedule+0xda5/0x5710
 ? __kasan_check_write+0x14/0x30
 ? _raw_spin_lock+0x82/0xf0
 vhost_scsi_ctl_handle_kick+0x52/0x90
 vhost_run_work_list+0x134/0x1b0
 vhost_task_fn+0x121/0x350
...
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---

Let's add a check in vhost_scsi_get_req.

[whitespace fixes]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232255">SUSE bug 1232255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49866</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/timerlat: Fix a race during cpuhp processing

There is another found exception that the "timerlat/1" thread was
scheduled on CPU0, and lead to timer corruption finally:

```
ODEBUG: init active (active state 0) object: ffff888237c2e108 object type: hrtimer hint: timerlat_irq+0x0/0x220
WARNING: CPU: 0 PID: 426 at lib/debugobjects.c:518 debug_print_object+0x7d/0xb0
Modules linked in:
CPU: 0 UID: 0 PID: 426 Comm: timerlat/1 Not tainted 6.11.0-rc7+ #45
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:debug_print_object+0x7d/0xb0
...
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x7c/0x110
 ? debug_print_object+0x7d/0xb0
 ? report_bug+0xf1/0x1d0
 ? prb_read_valid+0x17/0x20
 ? handle_bug+0x3f/0x70
 ? exc_invalid_op+0x13/0x60
 ? asm_exc_invalid_op+0x16/0x20
 ? debug_print_object+0x7d/0xb0
 ? debug_print_object+0x7d/0xb0
 ? __pfx_timerlat_irq+0x10/0x10
 __debug_object_init+0x110/0x150
 hrtimer_init+0x1d/0x60
 timerlat_main+0xab/0x2d0
 ? __pfx_timerlat_main+0x10/0x10
 kthread+0xb7/0xe0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2d/0x40
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
```

After tracing the scheduling event, it was discovered that the migration
of the "timerlat/1" thread was performed during thread creation. Further
analysis confirmed that it is because the CPU online processing for
osnoise is implemented through workers, which is asynchronous with the
offline processing. When the worker was scheduled to create a thread, the
CPU may has already been removed from the cpu_online_mask during the offline
process, resulting in the inability to select the right CPU:

T1                       | T2
[CPUHP_ONLINE]           | cpu_device_down()
osnoise_hotplug_workfn() |
                         |     cpus_write_lock()
                         |     takedown_cpu(1)
                         |     cpus_write_unlock()
[CPUHP_OFFLINE]          |
    cpus_read_lock()     |
    start_kthread(1)     |
    cpus_read_unlock()   |

To fix this, skip online processing if the CPU is already offline.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232259">SUSE bug 1232259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49867</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: wait for fixup workers before stopping cleaner kthread during umount

During unmount, at close_ctree(), we have the following steps in this order:

1) Park the cleaner kthread - this doesn't destroy the kthread, it basically
   halts its execution (wake ups against it work but do nothing);

2) We stop the cleaner kthread - this results in freeing the respective
   struct task_struct;

3) We call btrfs_stop_all_workers() which waits for any jobs running in all
   the work queues and then free the work queues.

Syzbot reported a case where a fixup worker resulted in a crash when doing
a delayed iput on its inode while attempting to wake up the cleaner at
btrfs_add_delayed_iput(), because the task_struct of the cleaner kthread
was already freed. This can happen during unmount because we don't wait
for any fixup workers still running before we call kthread_stop() against
the cleaner kthread, which stops and free all its resources.

Fix this by waiting for any fixup workers at close_ctree() before we call
kthread_stop() against the cleaner and run pending delayed iputs.

The stack traces reported by syzbot were the following:

  BUG: KASAN: slab-use-after-free in __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065
  Read of size 8 at addr ffff8880272a8a18 by task kworker/u8:3/52

  CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.12.0-rc1-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  Workqueue: btrfs-fixup btrfs_work_helper
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0x169/0x550 mm/kasan/report.c:488
   kasan_report+0x143/0x180 mm/kasan/report.c:601
   __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825
   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
   _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
   class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]
   try_to_wake_up+0xb0/0x1480 kernel/sched/core.c:4154
   btrfs_writepage_fixup_worker+0xc16/0xdf0 fs/btrfs/inode.c:2842
   btrfs_work_helper+0x390/0xc50 fs/btrfs/async-thread.c:314
   process_one_work kernel/workqueue.c:3229 [inline]
   process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
   worker_thread+0x870/0xd30 kernel/workqueue.c:3391
   kthread+0x2f0/0x390 kernel/kthread.c:389
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   &lt;/TASK&gt;

  Allocated by task 2:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
   unpoison_slab_object mm/kasan/common.c:319 [inline]
   __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
   kasan_slab_alloc include/linux/kasan.h:247 [inline]
   slab_post_alloc_hook mm/slub.c:4086 [inline]
   slab_alloc_node mm/slub.c:4135 [inline]
   kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4187
   alloc_task_struct_node kernel/fork.c:180 [inline]
   dup_task_struct+0x57/0x8c0 kernel/fork.c:1107
   copy_process+0x5d1/0x3d50 kernel/fork.c:2206
   kernel_clone+0x223/0x880 kernel/fork.c:2787
   kernel_thread+0x1bc/0x240 kernel/fork.c:2849
   create_kthread kernel/kthread.c:412 [inline]
   kthreadd+0x60d/0x810 kernel/kthread.c:765
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

  Freed by task 61:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
   kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
   poison_slab_object mm/kasan/common.c:247 [inline]
   __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
   kasan_slab_free include/linux/kasan.h:230 [inline]
   slab_free_h
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232271">SUSE bug 1232271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49868</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49868" ref_url="https://www.suse.com/security/cve/CVE-2024-49868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix a NULL pointer dereference when failed to start a new trasacntion

[BUG]
Syzbot reported a NULL pointer dereference with the following crash:

  FAULT_INJECTION: forcing a failure.
   start_transaction+0x830/0x1670 fs/btrfs/transaction.c:676
   prepare_to_relocate+0x31f/0x4c0 fs/btrfs/relocation.c:3642
   relocate_block_group+0x169/0xd20 fs/btrfs/relocation.c:3678
  ...
  BTRFS info (device loop0): balance: ended with status: -12
  Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cc: 0000 [#1] PREEMPT SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000660-0x0000000000000667]
  RIP: 0010:btrfs_update_reloc_root+0x362/0xa80 fs/btrfs/relocation.c:926
  Call Trace:
   &lt;TASK&gt;
   commit_fs_roots+0x2ee/0x720 fs/btrfs/transaction.c:1496
   btrfs_commit_transaction+0xfaf/0x3740 fs/btrfs/transaction.c:2430
   del_balance_item fs/btrfs/volumes.c:3678 [inline]
   reset_balance_state+0x25e/0x3c0 fs/btrfs/volumes.c:3742
   btrfs_balance+0xead/0x10c0 fs/btrfs/volumes.c:4574
   btrfs_ioctl_balance+0x493/0x7c0 fs/btrfs/ioctl.c:3673
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:907 [inline]
   __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

[CAUSE]
The allocation failure happens at the start_transaction() inside
prepare_to_relocate(), and during the error handling we call
unset_reloc_control(), which makes fs_info-&gt;balance_ctl to be NULL.

Then we continue the error path cleanup in btrfs_balance() by calling
reset_balance_state() which will call del_balance_item() to fully delete
the balance item in the root tree.

However during the small window between set_reloc_contrl() and
unset_reloc_control(), we can have a subvolume tree update and created a
reloc_root for that subvolume.

Then we go into the final btrfs_commit_transaction() of
del_balance_item(), and into btrfs_update_reloc_root() inside
commit_fs_roots().

That function checks if fs_info-&gt;reloc_ctl is in the merge_reloc_tree
stage, but since fs_info-&gt;reloc_ctl is NULL, it results a NULL pointer
dereference.

[FIX]
Just add extra check on fs_info-&gt;reloc_ctl inside
btrfs_update_reloc_root(), before checking
fs_info-&gt;reloc_ctl-&gt;merge_reloc_tree.

That DEAD_RELOC_TREE handling is to prevent further modification to the
reloc tree during merge stage, but since there is no reloc_ctl at all,
we do not need to bother that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49868/">CVE-2024-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232272">SUSE bug 1232272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49870</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix dentry leak in cachefiles_open_file()

A dentry leak may be caused when a lookup cookie and a cull are concurrent:

            P1             |             P2
-----------------------------------------------------------
cachefiles_lookup_cookie
  cachefiles_look_up_object
    lookup_one_positive_unlocked
     // get dentry
                            cachefiles_cull
                              inode-&gt;i_flags |= S_KERNEL_FILE;
    cachefiles_open_file
      cachefiles_mark_inode_in_use
        __cachefiles_mark_inode_in_use
          can_use = false
          if (!(inode-&gt;i_flags &amp; S_KERNEL_FILE))
            can_use = true
	  return false
        return false
        // Returns an error but doesn't put dentry

After that the following WARNING will be triggered when the backend folder
is umounted:

==================================================================
BUG: Dentry 000000008ad87947{i=7a,n=Dx_1_1.img}  still in use (1) [unmount of ext4 sda]
WARNING: CPU: 4 PID: 359261 at fs/dcache.c:1767 umount_check+0x5d/0x70
CPU: 4 PID: 359261 Comm: umount Not tainted 6.6.0-dirty #25
RIP: 0010:umount_check+0x5d/0x70
Call Trace:
 &lt;TASK&gt;
 d_walk+0xda/0x2b0
 do_one_tree+0x20/0x40
 shrink_dcache_for_umount+0x2c/0x90
 generic_shutdown_super+0x20/0x160
 kill_block_super+0x1a/0x40
 ext4_kill_sb+0x22/0x40
 deactivate_locked_super+0x35/0x80
 cleanup_mnt+0x104/0x160
==================================================================

Whether cachefiles_open_file() returns true or false, the reference count
obtained by lookup_positive_unlocked() in cachefiles_look_up_object()
should be released.

Therefore release that reference count in cachefiles_look_up_object() to
fix the above issue and simplify the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232279">SUSE bug 1232279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49871</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: adp5589-keys - fix NULL pointer dereference

We register a devm action to call adp5589_clear_config() and then pass
the i2c client as argument so that we can call i2c_get_clientdata() in
order to get our device object. However, i2c_set_clientdata() is only
being set at the end of the probe function which means that we'll get a
NULL pointer dereference in case the probe function fails early.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232287">SUSE bug 1232287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49875</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: map the EBADMSG to nfserr_io to avoid warning

Ext4 will throw -EBADMSG through ext4_readdir when a checksum error
occurs, resulting in the following WARNING.

Fix it by mapping EBADMSG to nfserr_io.

nfsd_buffered_readdir
 iterate_dir // -EBADMSG -74
  ext4_readdir // .iterate_shared
   ext4_dx_readdir
    ext4_htree_fill_tree
     htree_dirblock_to_tree
      ext4_read_dirblock
       __ext4_read_dirblock
        ext4_dirblock_csum_verify
         warn_no_space_for_csum
          __warn_no_space_for_csum
        return ERR_PTR(-EFSBADCRC) // -EBADMSG -74
 nfserrno // WARNING

[  161.115610] ------------[ cut here ]------------
[  161.116465] nfsd: non-standard errno: -74
[  161.117315] WARNING: CPU: 1 PID: 780 at fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0
[  161.118596] Modules linked in:
[  161.119243] CPU: 1 PID: 780 Comm: nfsd Not tainted 5.10.0-00014-g79679361fd5d #138
[  161.120684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe
mu.org 04/01/2014
[  161.123601] RIP: 0010:nfserrno+0x9d/0xd0
[  161.124676] Code: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6
 05 ce 2b 61 03 01 e8 99 20 d8 00 &lt;0f&gt; 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33
[  161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286
[  161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 RDI: fffff520001c5f2a
[  161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827
[  161.132664] R10: ffffed103ee18304 R11: 0000000000000001 R12: 0000000000000021
[  161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8
[  161.135244] FS:  0000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000
[  161.136695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0
[  161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  161.141519] PKRU: 55555554
[  161.142076] Call Trace:
[  161.142575]  ? __warn+0x9b/0x140
[  161.143229]  ? nfserrno+0x9d/0xd0
[  161.143872]  ? report_bug+0x125/0x150
[  161.144595]  ? handle_bug+0x41/0x90
[  161.145284]  ? exc_invalid_op+0x14/0x70
[  161.146009]  ? asm_exc_invalid_op+0x12/0x20
[  161.146816]  ? nfserrno+0x9d/0xd0
[  161.147487]  nfsd_buffered_readdir+0x28b/0x2b0
[  161.148333]  ? nfsd4_encode_dirent_fattr+0x380/0x380
[  161.149258]  ? nfsd_buffered_filldir+0xf0/0xf0
[  161.150093]  ? wait_for_concurrent_writes+0x170/0x170
[  161.151004]  ? generic_file_llseek_size+0x48/0x160
[  161.151895]  nfsd_readdir+0x132/0x190
[  161.152606]  ? nfsd4_encode_dirent_fattr+0x380/0x380
[  161.153516]  ? nfsd_unlink+0x380/0x380
[  161.154256]  ? override_creds+0x45/0x60
[  161.155006]  nfsd4_encode_readdir+0x21a/0x3d0
[  161.155850]  ? nfsd4_encode_readlink+0x210/0x210
[  161.156731]  ? write_bytes_to_xdr_buf+0x97/0xe0
[  161.157598]  ? __write_bytes_to_xdr_buf+0xd0/0xd0
[  161.158494]  ? lock_downgrade+0x90/0x90
[  161.159232]  ? nfs4svc_decode_voidarg+0x10/0x10
[  161.160092]  nfsd4_encode_operation+0x15a/0x440
[  161.160959]  nfsd4_proc_compound+0x718/0xe90
[  161.161818]  nfsd_dispatch+0x18e/0x2c0
[  161.162586]  svc_process_common+0x786/0xc50
[  161.163403]  ? nfsd_svc+0x380/0x380
[  161.164137]  ? svc_printk+0x160/0x160
[  161.164846]  ? svc_xprt_do_enqueue.part.0+0x365/0x380
[  161.165808]  ? nfsd_svc+0x380/0x380
[  161.166523]  ? rcu_is_watching+0x23/0x40
[  161.167309]  svc_process+0x1a5/0x200
[  161.168019]  nfsd+0x1f5/0x380
[  161.168663]  ? nfsd_shutdown_threads+0x260/0x260
[  161.169554]  kthread+0x1c4/0x210
[  161.170224]  ? kthread_insert_work_sanity_check+0x80/0x80
[  161.171246]  ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232333">SUSE bug 1232333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49877</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate

When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger
NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if
bh is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232339">SUSE bug 1232339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49879</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: omapdrm: Add missing check for alloc_ordered_workqueue

As it may return NULL pointer and cause NULL pointer dereference. Add check
for the return value of alloc_ordered_workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232349">SUSE bug 1232349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49881</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: update orig_path in ext4_find_extent()

In ext4_find_extent(), if the path is not big enough, we free it and set
*orig_path to NULL. But after reallocating and successfully initializing
the path, we don't update *orig_path, in which case the caller gets a
valid path but a NULL ppath, and this may cause a NULL pointer dereference
or a path memory leak. For example:

ext4_split_extent
  path = *ppath = 2000
  ext4_find_extent
    if (depth &gt; path[0].p_maxdepth)
      kfree(path = 2000);
      *orig_path = path = NULL;
      path = kcalloc() = 3000
  ext4_split_extent_at(*ppath = NULL)
    path = *ppath;
    ex = path[depth].p_ext;
    // NULL pointer dereference!

==================================================================
BUG: kernel NULL pointer dereference, address: 0000000000000010
CPU: 6 UID: 0 PID: 576 Comm: fsstress Not tainted 6.11.0-rc2-dirty #847
RIP: 0010:ext4_split_extent_at+0x6d/0x560
Call Trace:
 &lt;TASK&gt;
 ext4_split_extent.isra.0+0xcb/0x1b0
 ext4_ext_convert_to_initialized+0x168/0x6c0
 ext4_ext_handle_unwritten_extents+0x325/0x4d0
 ext4_ext_map_blocks+0x520/0xdb0
 ext4_map_blocks+0x2b0/0x690
 ext4_iomap_begin+0x20e/0x2c0
[...]
==================================================================

Therefore, *orig_path is updated when the extent lookup succeeds, so that
the caller can safely use path or *ppath.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49882</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double brelse() the buffer of the extents path

In ext4_ext_try_to_merge_up(), set path[1].p_bh to NULL after it has been
released, otherwise it may be released twice. An example of what triggers
this is as follows:

  split2    map    split1
|--------|-------|--------|

ext4_ext_map_blocks
 ext4_ext_handle_unwritten_extents
  ext4_split_convert_extents
   // path-&gt;p_depth == 0
   ext4_split_extent
     // 1. do split1
     ext4_split_extent_at
       |ext4_ext_insert_extent
       |  ext4_ext_create_new_leaf
       |    ext4_ext_grow_indepth
       |      le16_add_cpu(&amp;neh-&gt;eh_depth, 1)
       |    ext4_find_extent
       |      // return -ENOMEM
       |// get error and try zeroout
       |path = ext4_find_extent
       |  path-&gt;p_depth = 1
       |ext4_ext_try_to_merge
       |  ext4_ext_try_to_merge_up
       |    path-&gt;p_depth = 0
       |    brelse(path[1].p_bh)  ---&gt; not set to NULL here
       |// zeroout success
     // 2. update path
     ext4_find_extent
     // 3. do split2
     ext4_split_extent_at
       ext4_ext_insert_extent
         ext4_ext_create_new_leaf
           ext4_ext_grow_indepth
             le16_add_cpu(&amp;neh-&gt;eh_depth, 1)
           ext4_find_extent
             path[0].p_bh = NULL;
             path-&gt;p_depth = 1
             read_extent_tree_block  ---&gt; return err
             // path[1].p_bh is still the old value
             ext4_free_ext_path
               ext4_ext_drop_refs
                 // path-&gt;p_depth == 1
                 brelse(path[1].p_bh)  ---&gt; brelse a buffer twice

Finally got the following WARRNING when removing the buffer from lru:

============================================
VFS: brelse: Trying to free free buffer
WARNING: CPU: 2 PID: 72 at fs/buffer.c:1241 __brelse+0x58/0x90
CPU: 2 PID: 72 Comm: kworker/u19:1 Not tainted 6.9.0-dirty #716
RIP: 0010:__brelse+0x58/0x90
Call Trace:
 &lt;TASK&gt;
 __find_get_block+0x6e7/0x810
 bdev_getblk+0x2b/0x480
 __ext4_get_inode_loc+0x48a/0x1240
 ext4_get_inode_loc+0xb2/0x150
 ext4_reserve_inode_write+0xb7/0x230
 __ext4_mark_inode_dirty+0x144/0x6a0
 ext4_ext_insert_extent+0x9c8/0x3230
 ext4_ext_map_blocks+0xf45/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
============================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232200">SUSE bug 1232200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49883</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: aovid use-after-free in ext4_ext_insert_extent()

As Ojaswin mentioned in Link, in ext4_ext_insert_extent(), if the path is
reallocated in ext4_ext_create_new_leaf(), we'll use the stale path and
cause UAF. Below is a sample trace with dummy values:

ext4_ext_insert_extent
  path = *ppath = 2000
  ext4_ext_create_new_leaf(ppath)
    ext4_find_extent(ppath)
      path = *ppath = 2000
      if (depth &gt; path[0].p_maxdepth)
            kfree(path = 2000);
            *ppath = path = NULL;
      path = kcalloc() = 3000
      *ppath = 3000;
      return path;
  /* here path is still 2000, UAF! */
  eh = path[depth].p_hdr

==================================================================
BUG: KASAN: slab-use-after-free in ext4_ext_insert_extent+0x26d4/0x3330
Read of size 8 at addr ffff8881027bf7d0 by task kworker/u36:1/179
CPU: 3 UID: 0 PID: 179 Comm: kworker/u6:1 Not tainted 6.11.0-rc2-dirty #866
Call Trace:
 &lt;TASK&gt;
 ext4_ext_insert_extent+0x26d4/0x3330
 ext4_ext_map_blocks+0xe22/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
[...]

Allocated by task 179:
 ext4_find_extent+0x81c/0x1f70
 ext4_ext_map_blocks+0x146/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
 ext4_writepages+0x26d/0x4e0
 do_writepages+0x175/0x700
[...]

Freed by task 179:
 kfree+0xcb/0x240
 ext4_find_extent+0x7c0/0x1f70
 ext4_ext_insert_extent+0xa26/0x3330
 ext4_ext_map_blocks+0xe22/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
 ext4_writepages+0x26d/0x4e0
 do_writepages+0x175/0x700
[...]
==================================================================

So use *ppath to update the path to avoid the above problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232199">SUSE bug 1232199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49884</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at()

We hit the following use-after-free:

==================================================================
BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0
Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40
CPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 ext4_split_extent_at+0xba8/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Allocated by task 40:
 __kmalloc_noprof+0x1ac/0x480
 ext4_find_extent+0xf3b/0x1e70
 ext4_ext_map_blocks+0x188/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Freed by task 40:
 kfree+0xf1/0x2b0
 ext4_find_extent+0xa71/0x1e70
 ext4_ext_insert_extent+0xa22/0x3260
 ext4_split_extent_at+0x3ef/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
==================================================================

The flow of issue triggering is as follows:

ext4_split_extent_at
  path = *ppath
  ext4_ext_insert_extent(ppath)
    ext4_ext_create_new_leaf(ppath)
      ext4_find_extent(orig_path)
        path = *orig_path
        read_extent_tree_block
          // return -ENOMEM or -EIO
        ext4_free_ext_path(path)
          kfree(path)
        *orig_path = NULL
  a. If err is -ENOMEM:
  ext4_ext_dirty(path + path-&gt;p_depth)
  // path use-after-free !!!
  b. If err is -EIO and we have EXT_DEBUG defined:
  ext4_ext_show_leaf(path)
    eh = path[depth].p_hdr
    // path also use-after-free !!!

So when trying to zeroout or fix the extent length, call ext4_find_extent()
to update the path.

In addition we use *ppath directly as an ext4_ext_show_leaf() input to
avoid possible use-after-free when EXT_DEBUG is defined, and to avoid
unnecessary path updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232198">SUSE bug 1232198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49886</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug

Attaching SST PCI device to VM causes "BUG: KASAN: slab-out-of-bounds".
kasan report:
[   19.411889] ==================================================================
[   19.413702] BUG: KASAN: slab-out-of-bounds in _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.415634] Read of size 8 at addr ffff888829e65200 by task cpuhp/16/113
[   19.417368]
[   19.418627] CPU: 16 PID: 113 Comm: cpuhp/16 Tainted: G            E      6.9.0 #10
[   19.420435] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022
[   19.422687] Call Trace:
[   19.424091]  &lt;TASK&gt;
[   19.425448]  dump_stack_lvl+0x5d/0x80
[   19.426963]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.428694]  print_report+0x19d/0x52e
[   19.430206]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[   19.431837]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.433539]  kasan_report+0xf0/0x170
[   19.435019]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.436709]  _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.438379]  ? __pfx_sched_clock_cpu+0x10/0x10
[   19.439910]  isst_if_cpu_online+0x406/0x58f [isst_if_common]
[   19.441573]  ? __pfx_isst_if_cpu_online+0x10/0x10 [isst_if_common]
[   19.443263]  ? ttwu_queue_wakelist+0x2c1/0x360
[   19.444797]  cpuhp_invoke_callback+0x221/0xec0
[   19.446337]  cpuhp_thread_fun+0x21b/0x610
[   19.447814]  ? __pfx_cpuhp_thread_fun+0x10/0x10
[   19.449354]  smpboot_thread_fn+0x2e7/0x6e0
[   19.450859]  ? __pfx_smpboot_thread_fn+0x10/0x10
[   19.452405]  kthread+0x29c/0x350
[   19.453817]  ? __pfx_kthread+0x10/0x10
[   19.455253]  ret_from_fork+0x31/0x70
[   19.456685]  ? __pfx_kthread+0x10/0x10
[   19.458114]  ret_from_fork_asm+0x1a/0x30
[   19.459573]  &lt;/TASK&gt;
[   19.460853]
[   19.462055] Allocated by task 1198:
[   19.463410]  kasan_save_stack+0x30/0x50
[   19.464788]  kasan_save_track+0x14/0x30
[   19.466139]  __kasan_kmalloc+0xaa/0xb0
[   19.467465]  __kmalloc+0x1cd/0x470
[   19.468748]  isst_if_cdev_register+0x1da/0x350 [isst_if_common]
[   19.470233]  isst_if_mbox_init+0x108/0xff0 [isst_if_mbox_msr]
[   19.471670]  do_one_initcall+0xa4/0x380
[   19.472903]  do_init_module+0x238/0x760
[   19.474105]  load_module+0x5239/0x6f00
[   19.475285]  init_module_from_file+0xd1/0x130
[   19.476506]  idempotent_init_module+0x23b/0x650
[   19.477725]  __x64_sys_finit_module+0xbe/0x130
[   19.476506]  idempotent_init_module+0x23b/0x650
[   19.477725]  __x64_sys_finit_module+0xbe/0x130
[   19.478920]  do_syscall_64+0x82/0x160
[   19.480036]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   19.481292]
[   19.482205] The buggy address belongs to the object at ffff888829e65000
 which belongs to the cache kmalloc-512 of size 512
[   19.484818] The buggy address is located 0 bytes to the right of
 allocated 512-byte region [ffff888829e65000, ffff888829e65200)
[   19.487447]
[   19.488328] The buggy address belongs to the physical page:
[   19.489569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888829e60c00 pfn:0x829e60
[   19.491140] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.492466] anon flags: 0x57ffffc0000840(slab|head|node=1|zone=2|lastcpupid=0x1fffff)
[   19.493914] page_type: 0xffffffff()
[   19.494988] raw: 0057ffffc0000840 ffff88810004cc80 0000000000000000 0000000000000001
[   19.496451] raw: ffff888829e60c00 0000000080200018 00000001ffffffff 0000000000000000
[   19.497906] head: 0057ffffc0000840 ffff88810004cc80 0000000000000000 0000000000000001
[   19.499379] head: ffff888829e60c00 0000000080200018 00000001ffffffff 0000000000000000
[   19.500844] head: 0057ffffc0000003 ffffea0020a79801 ffffea0020a79848 00000000ffffffff
[   19.502316] head: 0000000800000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.503784] page dumped because: k
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232196">SUSE bug 1232196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49890</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: ensure the fw_info is not null before using it

This resolves the dereference null return value warning
reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232217">SUSE bug 1232217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49891</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths

When the HBA is undergoing a reset or is handling an errata event, NULL ptr
dereference crashes may occur in routines such as
lpfc_sli_flush_io_rings(), lpfc_dev_loss_tmo_callbk(), or
lpfc_abort_handler().

Add NULL ptr checks before dereferencing hdwq pointers that may have been
freed due to operations colliding with a reset or errata event handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232218">SUSE bug 1232218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49892</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Initialize get_bytes_per_element's default to 1

Variables, used as denominators and maybe not assigned to other values,
should not be 0. bytes_per_element_y &amp; bytes_per_element_c are
initialized by get_bytes_per_element() which should never return 0.

This fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232220">SUSE bug 1232220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49894</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in degamma hardware format translation

Fixes index out of bounds issue in
`cm_helper_translate_curve_to_degamma_hw_format` function. The issue
could occur when the index 'i' exceeds the number of transfer function
points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds the function returns
false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232354">SUSE bug 1232354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49895</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation

This commit addresses a potential index out of bounds issue in the
`cm3_helper_translate_curve_to_degamma_hw_format` function in the DCN30
color  management module. The issue could occur when the index 'i'
exceeds the  number of transfer function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, the function returns
false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:338 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:339 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:340 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232352">SUSE bug 1232352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49896</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check stream before comparing them

[WHAT &amp; HOW]
amdgpu_dm can pass a null stream to dc_is_stream_unchanged. It is
necessary to check for null before dereferencing them.

This fixes 1 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232221">SUSE bug 1232221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49897</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check phantom_stream before it is used

dcn32_enable_phantom_stream can return null, so returned value
must be checked before used.

This fixes 1 NULL_RETURNS issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232355">SUSE bug 1232355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49899</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Initialize denominators' default to 1

[WHAT &amp; HOW]
Variables used as denominators and maybe not assigned to other values,
should not be 0. Change their default to 1 so they are never 0.

This fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232358">SUSE bug 1232358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49900</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix uninit-value access of new_ea in ea_buffer

syzbot reports that lzo1x_1_do_compress is using uninit-value:

=====================================================
BUG: KMSAN: uninit-value in lzo1x_1_do_compress+0x19f9/0x2510 lib/lzo/lzo1x_compress.c:178

...

Uninit was stored to memory at:
 ea_put fs/jfs/xattr.c:639 [inline]

...

Local variable ea_buf created at:
 __jfs_setxattr+0x5d/0x1ae0 fs/jfs/xattr.c:662
 __jfs_xattr_set+0xe6/0x1f0 fs/jfs/xattr.c:934

=====================================================

The reason is ea_buf-&gt;new_ea is not initialized properly.

Fix this by using memset to empty its content at the beginning
in ea_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232359">SUSE bug 1232359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49901</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs

There are some cases, such as the one uncovered by Commit 46d4efcccc68
("drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails")
where

msm_gpu_cleanup() : platform_set_drvdata(gpu-&gt;pdev, NULL);

is called on gpu-&gt;pdev == NULL, as the GPU device has not been fully
initialized yet.

Turns out that there's more than just the aforementioned path that
causes this to happen (e.g. the case when there's speedbin data in the
catalog, but opp-supported-hw is missing in DT).

Assigning msm_gpu-&gt;pdev earlier seems like the least painful solution
to this, therefore do so.

Patchwork: https://patchwork.freedesktop.org/patch/602742/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232305">SUSE bug 1232305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49902</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: check if leafidx greater than num leaves per dmap tree

syzbot report a out of bounds in dbSplit, it because dmt_leafidx greater
than num leaves per dmap tree, add a checking for dmt_leafidx in dbFindLeaf.

Shaggy:
Modified sanity check to apply to control pages as well as leaf pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232378">SUSE bug 1232378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232379">SUSE bug 1232379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49903</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix uaf in dbFreeBits

[syzbot reported]
==================================================================
BUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]
BUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752
Read of size 8 at addr ffff8880229254b0 by task syz-executor357/5216

CPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 __mutex_lock_common kernel/locking/mutex.c:587 [inline]
 __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752
 dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390
 dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]
 dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409
 dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650
 jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100
 jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83

Freed by task 5218:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2252 [inline]
 slab_free mm/slub.c:4473 [inline]
 kfree+0x149/0x360 mm/slub.c:4594
 dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278
 jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247
 jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454
 reconfigure_super+0x445/0x880 fs/super.c:1083
 vfs_cmd_reconfigure fs/fsopen.c:263 [inline]
 vfs_fsconfig_locked fs/fsopen.c:292 [inline]
 __do_sys_fsconfig fs/fsopen.c:473 [inline]
 __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[Analysis]
There are two paths (dbUnmount and jfs_ioc_trim) that generate race
condition when accessing bmap, which leads to the occurrence of uaf.

Use the lock s_umount to synchronize them, in order to avoid uaf caused
by race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232362">SUSE bug 1232362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233020">SUSE bug 1233020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49905</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2)

This commit adds a null check for the 'afb' variable in the
amdgpu_dm_plane_handle_cursor_update function. Previously, 'afb' was
assumed to be null, but was used later in the code without a null check.
This could potentially lead to a null pointer dereference.

Changes since v1:
- Moved the null check for 'afb' to the line where 'afb' is used. (Alex)

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_plane.c:1298 amdgpu_dm_plane_handle_cursor_update() error: we previously assumed 'afb' could be null (see line 1252)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232357">SUSE bug 1232357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49906</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointer before try to access it

[why &amp; how]
Change the order of the pipe_ctx-&gt;plane_state check to ensure that
plane_state is not null before accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232332">SUSE bug 1232332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49907</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before using dc-&gt;clk_mgr

[WHY &amp; HOW]
dc-&gt;clk_mgr is null checked previously in the same function, indicating
it might be null.

Passing "dc" to "dc-&gt;hwss.apply_idle_power_optimizations", which
dereferences null "dc-&gt;clk_mgr". (The function pointer resolves to
"dcn35_apply_idle_power_optimizations".)

This fixes 1 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232334">SUSE bug 1232334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49908</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2)

This commit adds a null check for the 'afb' variable in the
amdgpu_dm_update_cursor function. Previously, 'afb' was assumed to be
null at line 8388, but was used later in the code without a null check.
This could potentially lead to a null pointer dereference.

Changes since v1:
- Moved the null check for 'afb' to the line where 'afb' is used. (Alex)

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm.c:8433 amdgpu_dm_update_cursor()
	error: we previously assumed 'afb' could be null (see line 8388)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49909</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the dcn32_set_output_transfer_func function. Previously,
set_output_gamma was being checked for null, but then it was being
dereferenced without any null check. This could lead to a null pointer
dereference if set_output_gamma is null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a null check for set_output_gamma
before the call to set_output_gamma.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232337">SUSE bug 1232337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49911</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the dcn20_set_output_transfer_func function. Previously,
set_output_gamma was being checked for null at line 1030, but then it
was being dereferenced without any null check at line 1048. This could
potentially lead to a null pointer dereference error if set_output_gamma
is null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a null check for set_output_gamma
before the call to set_output_gamma at line 1048.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232366">SUSE bug 1232366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49912</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream'

This commit adds a null check for 'stream_status' in the function
'planes_changed_for_existing_stream'. Previously, the code assumed
'stream_status' could be null, but did not handle the case where it was
actually null. This could lead to a null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/core/dc_resource.c:3784 planes_changed_for_existing_stream() error: we previously assumed 'stream_status' could be null (see line 3774)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232367">SUSE bug 1232367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49913</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream

This commit addresses a null pointer dereference issue in the
`commit_planes_for_stream` function at line 4140. The issue could occur
when `top_pipe_to_program` is null.

The fix adds a check to ensure `top_pipe_to_program` is not null before
accessing its stream_res. This prevents a null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/core/dc.c:4140 commit_planes_for_stream() error: we previously assumed 'top_pipe_to_program' could be null (see line 3906)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232307">SUSE bug 1232307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49914</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe

This commit addresses a null pointer dereference issue in the
`dcn20_program_pipe` function. The issue could occur when
`pipe_ctx-&gt;plane_state` is null.

The fix adds a check to ensure `pipe_ctx-&gt;plane_state` is not null
before accessing. This prevents a null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn20/dcn20_hwseq.c:1925 dcn20_program_pipe() error: we previously assumed 'pipe_ctx-&gt;plane_state' could be null (see line 1877)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232369">SUSE bug 1232369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49917</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn30_init_hw

This commit addresses a potential null pointer dereference issue in the
`dcn30_init_hw` function. The issue could occur when `dc-&gt;clk_mgr` or
`dc-&gt;clk_mgr-&gt;funcs` is null.

The fix adds a check to ensure `dc-&gt;clk_mgr` and `dc-&gt;clk_mgr-&gt;funcs` is
not null before accessing its functions. This prevents a potential null
pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:789 dcn30_init_hw() error: we previously assumed 'dc-&gt;clk_mgr' could be null (see line 628)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231965">SUSE bug 1231965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49918</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer

This commit addresses a potential null pointer dereference issue in the
`dcn32_acquire_idle_pipe_for_head_pipe_in_layer` function. The issue
could occur when `head_pipe` is null.

The fix adds a check to ensure `head_pipe` is not null before asserting
it. If `head_pipe` is null, the function returns NULL to prevent a
potential null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn32/dcn32_resource.c:2690 dcn32_acquire_idle_pipe_for_head_pipe_in_layer() error: we previously assumed 'head_pipe' could be null (see line 2681)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231967">SUSE bug 1231967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49919</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer

This commit addresses a potential null pointer dereference issue in the
`dcn201_acquire_free_pipe_for_layer` function. The issue could occur
when `head_pipe` is null.

The fix adds a check to ensure `head_pipe` is not null before asserting
it. If `head_pipe` is null, the function returns NULL to prevent a
potential null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn201/dcn201_resource.c:1016 dcn201_acquire_free_pipe_for_layer() error: we previously assumed 'head_pipe' could be null (see line 1010)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231968">SUSE bug 1231968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49920</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before multiple uses

[WHAT &amp; HOW]
Poniters, such as stream_enc and dc-&gt;bw_vbios, are null checked previously
in the same function, so Coverity warns "implies that stream_enc and
dc-&gt;bw_vbios might be null". They are used multiple times in the
subsequent code and need to be checked.

This fixes 10 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232313">SUSE bug 1232313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49921</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before used

[WHAT &amp; HOW]
Poniters, such as dc-&gt;clk_mgr, are null checked previously in the same
function, so Coverity warns "implies that "dc-&gt;clk_mgr" might be null".
As a result, these pointers need to be checked when used again.

This fixes 10 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232371">SUSE bug 1232371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49922</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before using them

[WHAT &amp; HOW]
These pointers are null checked previously in the same function,
indicating they might be null as reported by Coverity. As a result,
they need to be checked when used again.

This fixes 3 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232374">SUSE bug 1232374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags

[WHAT &amp; HOW]
"dcn20_validate_apply_pipe_split_flags" dereferences merge, and thus it
cannot be a null pointer. Let's pass a valid pointer to avoid null
dereference.

This fixes 2 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232361">SUSE bug 1232361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49924</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: pxafb: Fix possible use after free in pxafb_task()

In the pxafb_probe function, it calls the pxafb_init_fbinfo function,
after which &amp;fbi-&gt;task is associated with pxafb_task. Moreover,
within this pxafb_init_fbinfo function, the pxafb_blank function
within the &amp;pxafb_ops struct is capable of scheduling work.

If we remove the module which will call pxafb_remove to make cleanup,
it will call unregister_framebuffer function which can call
do_unregister_framebuffer to free fbi-&gt;fb through
put_fb_info(fb_info), while the work mentioned above will be used.
The sequence of operations that may lead to a UAF bug is as follows:

CPU0                                                CPU1

                                   | pxafb_task
pxafb_remove                       |
unregister_framebuffer(info)       |
do_unregister_framebuffer(fb_info) |
put_fb_info(fb_info)               |
// free fbi-&gt;fb                    | set_ctrlr_state(fbi, state)
                                   | __pxafb_lcd_power(fbi, 0)
                                   | fbi-&gt;lcd_power(on, &amp;fbi-&gt;fb.var)
                                   | //use fbi-&gt;fb

Fix it by ensuring that the work is canceled before proceeding
with the cleanup in pxafb_remove.

Note that only root user can remove the driver at runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232364">SUSE bug 1232364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49925</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: efifb: Register sysfs groups through driver core

The driver core can register and cleanup sysfs groups already.
Make use of that functionality to simplify the error handling and
cleanup.

Also avoid a UAF race during unregistering where the sysctl attributes
were usable after the info struct was freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232224">SUSE bug 1232224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232225">SUSE bug 1232225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49929</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: avoid NULL pointer dereference

iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta
pointer is not NULL.
It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is
dereferencing the ieee80211_sta pointer.
If sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL
pointer.
Fix this by checking the sta pointer before retrieving the mvmsta
from it. If sta is not NULL, then mvmsta isn't either.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232253">SUSE bug 1232253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49930</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix array out-of-bound access in SoC stats

Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a
maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx()
function access ath11k_soc_dp_stats::hal_reo_error using the REO
destination SRNG ring ID, which is incorrect. SRNG ring ID differ from
normal ring ID, and this usage leads to out-of-bounds array access. To fix
this issue, modify ath11k_dp_process_rx() to use the normal ring ID
directly instead of the SRNG ring ID to avoid out-of-bounds array access.

Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232261">SUSE bug 1232261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49933</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk_iocost: fix more out of bound shifts

Recently running UBSAN caught few out of bound shifts in the
ioc_forgive_debts() function:

UBSAN: shift-out-of-bounds in block/blk-iocost.c:2142:38
shift exponent 80 is too large for 64-bit type 'u64' (aka 'unsigned long
long')
...
UBSAN: shift-out-of-bounds in block/blk-iocost.c:2144:30
shift exponent 80 is too large for 64-bit type 'u64' (aka 'unsigned long
long')
...
Call Trace:
&lt;IRQ&gt;
dump_stack_lvl+0xca/0x130
__ubsan_handle_shift_out_of_bounds+0x22c/0x280
? __lock_acquire+0x6441/0x7c10
ioc_timer_fn+0x6cec/0x7750
? blk_iocost_init+0x720/0x720
? call_timer_fn+0x5d/0x470
call_timer_fn+0xfa/0x470
? blk_iocost_init+0x720/0x720
__run_timer_base+0x519/0x700
...

Actual impact of this issue was not identified but I propose to fix the
undefined behaviour.
The proposed fix to prevent those out of bound shifts consist of
precalculating exponent before using it the shift operations by taking
min value from the actual exponent and maximum possible number of bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232368">SUSE bug 1232368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49934</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name

It's observed that a crash occurs during hot-remove a memory device,
in which user is accessing the hugetlb. See calltrace as following:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790
Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s
mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:do_user_addr_fault+0x2a0/0x790
Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 42 fe ff ff &lt;0f&gt; 0b 48 83 c4 08 4c 89 ea 48 89 ee 4c 89 e7 5b 5d 41 5c 41 5d 41
RSP: 0000:ffffc90000a575f0 EFLAGS: 00010046
RAX: ffff88800c303600 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000001000 RSI: ffffffff82504162 RDI: ffffffff824b2c36
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90000a57658
R13: 0000000000001000 R14: ffff88800bc2e040 R15: 0000000000000000
FS:  00007f51cb57d880(0000) GS:ffff88807fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000001000 CR3: 00000000072e2004 CR4: 00000000001706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x8d/0x190
 ? do_user_addr_fault+0x2a0/0x790
 ? report_bug+0x1c3/0x1d0
 ? handle_bug+0x3c/0x70
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? do_user_addr_fault+0x2a0/0x790
 ? exc_page_fault+0x31/0x200
 exc_page_fault+0x68/0x200
&lt;...snip...&gt;
BUG: unable to handle page fault for address: 0000000000001000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP PTI
 ---[ end trace 0000000000000000 ]---
 BUG: unable to handle page fault for address: 0000000000001000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 14045 Comm: daxctl Kdump: loaded Tainted: G        W          6.10.0-rc2-lizhijian+ #492
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
 RIP: 0010:dentry_name+0x1f4/0x440
&lt;...snip...&gt;
? dentry_name+0x2fa/0x440
vsnprintf+0x1f3/0x4f0
vprintk_store+0x23a/0x540
vprintk_emit+0x6d/0x330
_printk+0x58/0x80
dump_mapping+0x10b/0x1a0
? __pfx_free_object_rcu+0x10/0x10
__dump_page+0x26b/0x3e0
? vprintk_emit+0xe0/0x330
? _printk+0x58/0x80
? dump_page+0x17/0x50
dump_page+0x17/0x50
do_migrate_range+0x2f7/0x7f0
? do_migrate_range+0x42/0x7f0
? offline_pages+0x2f4/0x8c0
offline_pages+0x60a/0x8c0
memory_subsys_offline+0x9f/0x1c0
? lockdep_hardirqs_on+0x77/0x100
? _raw_spin_unlock_irqrestore+0x38/0x60
device_offline+0xe3/0x110
state_store+0x6e/0xc0
kernfs_fop_write_iter+0x143/0x200
vfs_write+0x39f/0x560
ksys_write+0x65/0xf0
do_syscall_64+0x62/0x130

Previously, some sanity check have been done in dump_mapping() before
the print facility parsing '%pd' though, it's still possible to run into
an invalid dentry.d_name.name.

Since dump_mapping() only needs to dump the filename only, retrieve it
by itself in a safer way to prevent an unnecessary crash.

Note that either retrieving the filename with '%pd' or
strncpy_from_kernel_nofault(), the filename could be unreliable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232387">SUSE bug 1232387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49935</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: PAD: fix crash in exit_round_robin()

The kernel occasionally crashes in cpumask_clear_cpu(), which is called
within exit_round_robin(), because when executing clear_bit(nr, addr) with
nr set to 0xffffffff, the address calculation may cause misalignment within
the memory, leading to access to an invalid memory address.

----------
BUG: unable to handle kernel paging request at ffffffffe0740618
        ...
CPU: 3 PID: 2919323 Comm: acpi_pad/14 Kdump: loaded Tainted: G           OE  X --------- -  - 4.18.0-425.19.2.el8_7.x86_64 #1
        ...
RIP: 0010:power_saving_thread+0x313/0x411 [acpi_pad]
Code: 89 cd 48 89 d3 eb d1 48 c7 c7 55 70 72 c0 e8 64 86 b0 e4 c6 05 0d a1 02 00 01 e9 bc fd ff ff 45 89 e4 42 8b 04 a5 20 82 72 c0 &lt;f0&gt; 48 0f b3 05 f4 9c 01 00 42 c7 04 a5 20 82 72 c0 ff ff ff ff 31
RSP: 0018:ff72a5d51fa77ec8 EFLAGS: 00010202
RAX: 00000000ffffffff RBX: ff462981e5d8cb80 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
RBP: ff46297556959d80 R08: 0000000000000382 R09: ff46297c8d0f38d8
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000000e
R13: 0000000000000000 R14: ffffffffffffffff R15: 000000000000000e
FS:  0000000000000000(0000) GS:ff46297a800c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffe0740618 CR3: 0000007e20410004 CR4: 0000000000771ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 ? acpi_pad_add+0x120/0x120 [acpi_pad]
 kthread+0x10b/0x130
 ? set_kthread_struct+0x50/0x50
 ret_from_fork+0x1f/0x40
        ...
CR2: ffffffffe0740618

crash&gt; dis -lr ffffffffc0726923
        ...
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 114
0xffffffffc0726918 &lt;power_saving_thread+776&gt;:	mov    %r12d,%r12d
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 325
0xffffffffc072691b &lt;power_saving_thread+779&gt;:	mov    -0x3f8d7de0(,%r12,4),%eax
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./arch/x86/include/asm/bitops.h: 80
0xffffffffc0726923 &lt;power_saving_thread+787&gt;:	lock btr %rax,0x19cf4(%rip)        # 0xffffffffc0740620 &lt;pad_busy_cpus_bits&gt;

crash&gt; px tsk_in_cpu[14]
$66 = 0xffffffff

crash&gt; px 0xffffffffc072692c+0x19cf4
$99 = 0xffffffffc0740620

crash&gt; sym 0xffffffffc0740620
ffffffffc0740620 (b) pad_busy_cpus_bits [acpi_pad]

crash&gt; px pad_busy_cpus_bits[0]
$42 = 0xfffc0
----------

To fix this, ensure that tsk_in_cpu[tsk_index] != -1 before calling
cpumask_clear_cpu() in exit_round_robin(), just as it is done in
round_robin_cpu().

[ rjw: Subject edit, avoid updates to the same value ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232370">SUSE bug 1232370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49936</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/xen-netback: prevent UAF in xenvif_flush_hash()

During the list_for_each_entry_rcu iteration call of xenvif_flush_hash,
kfree_rcu does not exist inside the rcu read critical section, so if
kfree_rcu is called when the rcu grace period ends during the iteration,
UAF occurs when accessing head-&gt;next after the entry becomes free.

Therefore, to solve this, you need to change it to list_for_each_entry_safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232424">SUSE bug 1232424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232426">SUSE bug 1232426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49938</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit

Syzbot points out that skb_trim() has a sanity check on the existing length of
the skb, which can be uninitialised in some error paths. The intent here is
clearly just to reset the length to zero before resubmitting, so switch to
calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()
already contains a call to skb_reset_tail_pointer(), so remove the redundant
call.

The syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar
usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232552">SUSE bug 1232552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49939</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid to add interface to list twice when SER

If SER L2 occurs during the WoWLAN resume flow, the add interface flow
is triggered by ieee80211_reconfig(). However, due to
rtw89_wow_resume() return failure, it will cause the add interface flow
to be executed again, resulting in a double add list and causing a kernel
panic. Therefore, we have added a check to prevent double adding of the
list.

list_add double add: new=ffff99d6992e2010, prev=ffff99d6992e2010, next=ffff99d695302628.
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:37!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G        W  O       6.6.30-02659-gc18865c4dfbd #1 770df2933251a0e3c888ba69d1053a817a6376a7
Hardware name: HP Grunt/Grunt, BIOS Google_Grunt.11031.169.0 06/24/2021
Workqueue: events_freezable ieee80211_restart_work [mac80211]
RIP: 0010:__list_add_valid_or_report+0x5e/0xb0
Code: c7 74 18 48 39 ce 74 13 b0 01 59 5a 5e 5f 41 58 41 59 41 5a 5d e9 e2 d6 03 00 cc 48 c7 c7 8d 4f 17 83 48 89 c2 e8 02 c0 00 00 &lt;0f&gt; 0b 48 c7 c7 aa 8c 1c 83 e8 f4 bf 00 00 0f 0b 48 c7 c7 c8 bc 12
RSP: 0018:ffffa91b8007bc50 EFLAGS: 00010246
RAX: 0000000000000058 RBX: ffff99d6992e0900 RCX: a014d76c70ef3900
RDX: ffffa91b8007bae8 RSI: 00000000ffffdfff RDI: 0000000000000001
RBP: ffffa91b8007bc88 R08: 0000000000000000 R09: ffffa91b8007bae0
R10: 00000000ffffdfff R11: ffffffff83a79800 R12: ffff99d695302060
R13: ffff99d695300900 R14: ffff99d6992e1be0 R15: ffff99d6992e2010
FS:  0000000000000000(0000) GS:ffff99d6aac00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000078fbdba43480 CR3: 000000010e464000 CR4: 00000000001506f0
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1f/0x70
 ? die+0x3d/0x60
 ? do_trap+0xa4/0x110
 ? __list_add_valid_or_report+0x5e/0xb0
 ? do_error_trap+0x6d/0x90
 ? __list_add_valid_or_report+0x5e/0xb0
 ? handle_invalid_op+0x30/0x40
 ? __list_add_valid_or_report+0x5e/0xb0
 ? exc_invalid_op+0x3c/0x50
 ? asm_exc_invalid_op+0x16/0x20
 ? __list_add_valid_or_report+0x5e/0xb0
 rtw89_ops_add_interface+0x309/0x310 [rtw89_core 7c32b1ee6854761c0321027c8a58c5160e41f48f]
 drv_add_interface+0x5c/0x130 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 ieee80211_reconfig+0x241/0x13d0 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 ? finish_wait+0x3e/0x90
 ? synchronize_rcu_expedited+0x174/0x260
 ? sync_rcu_exp_done_unlocked+0x50/0x50
 ? wake_bit_function+0x40/0x40
 ieee80211_restart_work+0xf0/0x140 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 process_scheduled_works+0x1e5/0x480
 worker_thread+0xea/0x1e0
 kthread+0xdb/0x110
 ? move_linked_works+0x90/0x90
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork+0x3b/0x50
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;
Modules linked in: dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc rfcomm cmac uinput algif_hash algif_skcipher af_alg btusb btrtl iio_trig_hrtimer industrialio_sw_trigger btmtk industrialio_configfs btbcm btintel uvcvideo videobuf2_vmalloc iio_trig_sysfs videobuf2_memops videobuf2_v4l2 videobuf2_common uvc snd_hda_codec_hdmi veth snd_hda_intel snd_intel_dspcfg acpi_als snd_hda_codec industrialio_triggered_buffer kfifo_buf snd_hwdep industrialio i2c_piix4 snd_hda_core designware_i2s ip6table_nat snd_soc_max98357a xt_MASQUERADE xt_cgroup snd_soc_acp_rt5682_mach fuse rtw89_8922ae(O) rtw89_8922a(O) rtw89_pci(O) rtw89_core(O) 8021q mac80211(O) bluetooth ecdh_generic ecc cfg80211 r8152 mii joydev
gsmi: Log Shutdown Reason 0x03
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232381">SUSE bug 1232381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49945</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ncsi: Disable the ncsi work before freeing the associated structure

The work function can run after the ncsi device is freed, resulting
in use-after-free bugs or kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232165">SUSE bug 1232165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49946</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: do not assume bh is held in ppp_channel_bridge_input()

Networking receive path is usually handled from BH handler.
However, some protocols need to acquire the socket lock, and
packets might be stored in the socket backlog is the socket was
owned by a user process.

In this case, release_sock(), __release_sock(), and sk_backlog_rcv()
might call the sk-&gt;sk_backlog_rcv() handler in process context.

sybot caught ppp was not considering this case in
ppp_channel_bridge_input() :

WARNING: inconsistent lock state
6.11.0-rc7-syzkaller-g5f5673607153 #0 Not tainted
--------------------------------
inconsistent {SOFTIRQ-ON-W} -&gt; {IN-SOFTIRQ-W} usage.
ksoftirqd/1/24 [HC0[0]:SC1[1]:HE1:SE0] takes:
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
{SOFTIRQ-ON-W} state was registered at:
   lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5759
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x48/0x60 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
   ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
   pppoe_rcv_core+0xfc/0x314 drivers/net/ppp/pppoe.c:379
   sk_backlog_rcv include/net/sock.h:1111 [inline]
   __release_sock+0x1a8/0x3d8 net/core/sock.c:3004
   release_sock+0x68/0x1b8 net/core/sock.c:3558
   pppoe_sendmsg+0xc8/0x5d8 drivers/net/ppp/pppoe.c:903
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg net/socket.c:745 [inline]
   __sys_sendto+0x374/0x4f4 net/socket.c:2204
   __do_sys_sendto net/socket.c:2216 [inline]
   __se_sys_sendto net/socket.c:2212 [inline]
   __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2212
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
irq event stamp: 282914
 hardirqs last  enabled at (282914): [&lt;ffff80008b42e30c&gt;] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
 hardirqs last  enabled at (282914): [&lt;ffff80008b42e30c&gt;] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194
 hardirqs last disabled at (282913): [&lt;ffff80008b42e13c&gt;] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline]
 hardirqs last disabled at (282913): [&lt;ffff80008b42e13c&gt;] _raw_spin_lock_irqsave+0x2c/0x7c kernel/locking/spinlock.c:162
 softirqs last  enabled at (282904): [&lt;ffff8000801f8e88&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
 softirqs last  enabled at (282904): [&lt;ffff8000801f8e88&gt;] handle_softirqs+0xa3c/0xbfc kernel/softirq.c:582
 softirqs last disabled at (282909): [&lt;ffff8000801fbdf8&gt;] run_ksoftirqd+0x70/0x158 kernel/softirq.c:928

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&amp;pch-&gt;downl);
  &lt;Interrupt&gt;
    lock(&amp;pch-&gt;downl);

 *** DEADLOCK ***

1 lock held by ksoftirqd/1/24:
  #0: ffff80008f74dfa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:325

stack backtrace:
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call trace:
  dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319
  show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326
  __dump_sta
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232164">SUSE bug 1232164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49947</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: test for not too small csum_start in virtio_net_hdr_to_skb()

syzbot was able to trigger this warning [1], after injecting a
malicious packet through af_packet, setting skb-&gt;csum_start and thus
the transport header to an incorrect value.

We can at least make sure the transport header is after
the end of the network header (with a estimated minimal size).

[1]
[   67.873027] skb len=4096 headroom=16 headlen=14 tailroom=0
mac=(-1,-1) mac_len=0 net=(16,-6) trans=10
shinfo(txflags=0 nr_frags=1 gso(size=0 type=0 segs=0))
csum(0xa start=10 offset=0 ip_summed=3 complete_sw=0 valid=0 level=0)
hash(0x0 sw=0 l4=0) proto=0x0800 pkttype=0 iif=0
priority=0x0 mark=0x0 alloc_cpu=10 vlan_all=0x0
encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0)
[   67.877172] dev name=veth0_vlan feat=0x000061164fdd09e9
[   67.877764] sk family=17 type=3 proto=0
[   67.878279] skb linear:   00000000: 00 00 10 00 00 00 00 00 0f 00 00 00 08 00
[   67.879128] skb frag:     00000000: 0e 00 07 00 00 00 28 00 08 80 1c 00 04 00 00 02
[   67.879877] skb frag:     00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.880647] skb frag:     00000020: 00 00 02 00 00 00 08 00 1b 00 00 00 00 00 00 00
[   67.881156] skb frag:     00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.881753] skb frag:     00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.882173] skb frag:     00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.882790] skb frag:     00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.883171] skb frag:     00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.883733] skb frag:     00000080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.884206] skb frag:     00000090: 00 00 00 00 00 00 00 00 00 00 69 70 76 6c 61 6e
[   67.884704] skb frag:     000000a0: 31 00 00 00 00 00 00 00 00 00 2b 00 00 00 00 00
[   67.885139] skb frag:     000000b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.885677] skb frag:     000000c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.886042] skb frag:     000000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.886408] skb frag:     000000e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.887020] skb frag:     000000f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.887384] skb frag:     00000100: 00 00
[   67.887878] ------------[ cut here ]------------
[   67.887908] offset (-6) &gt;= skb_headlen() (14)
[   67.888445] WARNING: CPU: 10 PID: 2088 at net/core/dev.c:3332 skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.889353] Modules linked in: macsec macvtap macvlan hsr wireguard curve25519_x86_64 libcurve25519_generic libchacha20poly1305 chacha_x86_64 libchacha poly1305_x86_64 dummy bridge sr_mod cdrom evdev pcspkr i2c_piix4 9pnet_virtio 9p 9pnet netfs
[   67.890111] CPU: 10 UID: 0 PID: 2088 Comm: b363492833 Not tainted 6.11.0-virtme #1011
[   67.890183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   67.890309] RIP: 0010:skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891043] Call Trace:
[   67.891173]  &lt;TASK&gt;
[   67.891274] ? __warn (kernel/panic.c:741)
[   67.891320] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891333] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[   67.891348] ? handle_bug (arch/x86/kernel/traps.c:239)
[   67.891363] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[   67.891372] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)
[   67.891388] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891399] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891416] ip_do_fragment (net/ipv4/ip_output.c:777 (discriminator 1))
[   67.891448] ? __ip_local_out (./include/linux/skbuff.h:1146 ./include/net/l3mdev.h:196 ./include/net/l3mdev.h:213 ne
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232162">SUSE bug 1232162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49949</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: avoid potential underflow in qdisc_pkt_len_init() with UFO

After commit 7c6d2ecbda83 ("net: be more gentle about silly gso
requests coming from user") virtio_net_hdr_to_skb() had sanity check
to detect malicious attempts from user space to cook a bad GSO packet.

Then commit cf9acc90c80ec ("net: virtio_net_hdr_to_skb: count
transport header in UFO") while fixing one issue, allowed user space
to cook a GSO packet with the following characteristic :

IPv4 SKB_GSO_UDP, gso_size=3, skb-&gt;len = 28.

When this packet arrives in qdisc_pkt_len_init(), we end up
with hdr_len = 28 (IPv4 header + UDP header), matching skb-&gt;len

Then the following sets gso_segs to 0 :

gso_segs = DIV_ROUND_UP(skb-&gt;len - hdr_len,
                        shinfo-&gt;gso_size);

Then later we set qdisc_skb_cb(skb)-&gt;pkt_len to back to zero :/

qdisc_skb_cb(skb)-&gt;pkt_len += (gso_segs - 1) * hdr_len;

This leads to the following crash in fq_codel [1]

qdisc_pkt_len_init() is best effort, we only want an estimation
of the bytes sent on the wire, not crashing the kernel.

This patch is fixing this particular issue, a following one
adds more sanity checks for another potential bug.

[1]
[   70.724101] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   70.724561] #PF: supervisor read access in kernel mode
[   70.724561] #PF: error_code(0x0000) - not-present page
[   70.724561] PGD 10ac61067 P4D 10ac61067 PUD 107ee2067 PMD 0
[   70.724561] Oops: Oops: 0000 [#1] SMP NOPTI
[   70.724561] CPU: 11 UID: 0 PID: 2163 Comm: b358537762 Not tainted 6.11.0-virtme #991
[   70.724561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.724561] RIP: 0010:fq_codel_enqueue (net/sched/sch_fq_codel.c:120 net/sched/sch_fq_codel.c:168 net/sched/sch_fq_codel.c:230) sch_fq_codel
[ 70.724561] Code: 24 08 49 c1 e1 06 44 89 7c 24 18 45 31 ed 45 31 c0 31 ff 89 44 24 14 4c 03 8b 90 01 00 00 eb 04 39 ca 73 37 4d 8b 39 83 c7 01 &lt;49&gt; 8b 17 49 89 11 41 8b 57 28 45 8b 5f 34 49 c7 07 00 00 00 00 49
All code
========
   0:	24 08                	and    $0x8,%al
   2:	49 c1 e1 06          	shl    $0x6,%r9
   6:	44 89 7c 24 18       	mov    %r15d,0x18(%rsp)
   b:	45 31 ed             	xor    %r13d,%r13d
   e:	45 31 c0             	xor    %r8d,%r8d
  11:	31 ff                	xor    %edi,%edi
  13:	89 44 24 14          	mov    %eax,0x14(%rsp)
  17:	4c 03 8b 90 01 00 00 	add    0x190(%rbx),%r9
  1e:	eb 04                	jmp    0x24
  20:	39 ca                	cmp    %ecx,%edx
  22:	73 37                	jae    0x5b
  24:	4d 8b 39             	mov    (%r9),%r15
  27:	83 c7 01             	add    $0x1,%edi
  2a:*	49 8b 17             	mov    (%r15),%rdx		&lt;-- trapping instruction
  2d:	49 89 11             	mov    %rdx,(%r9)
  30:	41 8b 57 28          	mov    0x28(%r15),%edx
  34:	45 8b 5f 34          	mov    0x34(%r15),%r11d
  38:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  3f:	49                   	rex.WB

Code starting with the faulting instruction
===========================================
   0:	49 8b 17             	mov    (%r15),%rdx
   3:	49 89 11             	mov    %rdx,(%r9)
   6:	41 8b 57 28          	mov    0x28(%r15),%edx
   a:	45 8b 5f 34          	mov    0x34(%r15),%r11d
   e:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  15:	49                   	rex.WB
[   70.724561] RSP: 0018:ffff95ae85e6fb90 EFLAGS: 00000202
[   70.724561] RAX: 0000000002000000 RBX: ffff95ae841de000 RCX: 0000000000000000
[   70.724561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
[   70.724561] RBP: ffff95ae85e6fbf8 R08: 0000000000000000 R09: ffff95b710a30000
[   70.724561] R10: 0000000000000000 R11: bdf289445ce31881 R12: ffff95ae85e6fc58
[   70.724561] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000000
[   70.724561] FS:  000000002c5c1380(0000) GS:ffff95bd7fcc0000(0000) knlGS:0000000000000000
[   70.724561] CS:  0010 DS: 0000 ES: 0000 C
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232160">SUSE bug 1232160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49950</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix uaf in l2cap_connect

[Syzbot reported]
BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54

CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci2 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc3/0x620 mm/kasan/report.c:488
 kasan_report+0xd9/0x110 mm/kasan/report.c:601
 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline]
 l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline]
 l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline]
 l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825
 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514
 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline]
 hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
...

Freed by task 5245:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579
 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240
 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x12a/0x3b0 mm/slub.c:4598
 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline]
 kref_put include/linux/kref.h:65 [inline]
 l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline]
 l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802
 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241
 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline]
 hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265
 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583
 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917
 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232159">SUSE bug 1232159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49954</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

static_call: Replace pointless WARN_ON() in static_call_module_notify()

static_call_module_notify() triggers a WARN_ON(), when memory allocation
fails in __static_call_add_module().

That's not really justified, because the failure case must be correctly
handled by the well known call chain and the error code is passed
through to the initiating userspace application.

A memory allocation fail is not a fatal problem, but the WARN_ON() takes
the machine out when panic_on_warn is set.

Replace it with a pr_warn().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232155">SUSE bug 1232155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49955</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: battery: Fix possible crash when unregistering a battery hook

When a battery hook returns an error when adding a new battery, then
the battery hook is automatically unregistered.
However the battery hook provider cannot know that, so it will later
call battery_hook_unregister() on the already unregistered battery
hook, resulting in a crash.

Fix this by using the list head to mark already unregistered battery
hooks as already being unregistered so that they can be ignored by
battery_hook_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232154">SUSE bug 1232154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49957</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix null-ptr-deref when journal load failed.

During the mounting process, if journal_reset() fails because of too short
journal, then lead to jbd2_journal_load() fails with NULL j_sb_buffer. 
Subsequently, ocfs2_journal_shutdown() calls
jbd2_journal_flush()-&gt;jbd2_cleanup_journal_tail()-&gt;
__jbd2_update_log_tail()-&gt;jbd2_journal_update_sb_log_tail()
-&gt;lock_buffer(journal-&gt;j_sb_buffer), resulting in a null-pointer
dereference error.

To resolve this issue, we should check the JBD2_LOADED flag to ensure the
journal was properly loaded.  Additionally, use journal instead of
osb-&gt;journal directly to simplify the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232152">SUSE bug 1232152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49958</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: reserve space for inline xattr before attaching reflink tree

One of our customers reported a crash and a corrupted ocfs2 filesystem. 
The crash was due to the detection of corruption.  Upon troubleshooting,
the fsck -fn output showed the below corruption

[EXTENT_LIST_FREE] Extent list in owner 33080590 claims 230 as the next free chain record,
but fsck believes the largest valid value is 227.  Clamp the next record value? n

The stat output from the debugfs.ocfs2 showed the following corruption
where the "Next Free Rec:" had overshot the "Count:" in the root metadata
block.

        Inode: 33080590   Mode: 0640   Generation: 2619713622 (0x9c25a856)
        FS Generation: 904309833 (0x35e6ac49)
        CRC32: 00000000   ECC: 0000
        Type: Regular   Attr: 0x0   Flags: Valid
        Dynamic Features: (0x16) HasXattr InlineXattr Refcounted
        Extended Attributes Block: 0  Extended Attributes Inline Size: 256
        User: 0 (root)   Group: 0 (root)   Size: 281320357888
        Links: 1   Clusters: 141738
        ctime: 0x66911b56 0x316edcb8 -- Fri Jul 12 06:02:30.829349048 2024
        atime: 0x66911d6b 0x7f7a28d -- Fri Jul 12 06:11:23.133669517 2024
        mtime: 0x66911b56 0x12ed75d7 -- Fri Jul 12 06:02:30.317552087 2024
        dtime: 0x0 -- Wed Dec 31 17:00:00 1969
        Refcount Block: 2777346
        Last Extblk: 2886943   Orphan Slot: 0
        Sub Alloc Slot: 0   Sub Alloc Bit: 14
        Tree Depth: 1   Count: 227   Next Free Rec: 230
        ## Offset        Clusters       Block#
        0  0             2310           2776351
        1  2310          2139           2777375
        2  4449          1221           2778399
        3  5670          731            2779423
        4  6401          566            2780447
        .......          ....           .......
        .......          ....           .......

The issue was in the reflink workfow while reserving space for inline
xattr.  The problematic function is ocfs2_reflink_xattr_inline().  By the
time this function is called the reflink tree is already recreated at the
destination inode from the source inode.  At this point, this function
reserves space for inline xattrs at the destination inode without even
checking if there is space at the root metadata block.  It simply reduces
the l_count from 243 to 227 thereby making space of 256 bytes for inline
xattr whereas the inode already has extents beyond this index (in this
case up to 230), thereby causing corruption.

The fix for this is to reserve space for inline metadata at the destination
inode before the reflink tree gets recreated. The customer has verified the
fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232151">SUSE bug 1232151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49959</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error

In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail()
to recover some journal space. But if an error occurs while executing
jbd2_cleanup_journal_tail() (e.g., an EIO), we don't stop waiting for free
space right away, we try other branches, and if j_committing_transaction
is NULL (i.e., the tid is 0), we will get the following complain:

============================================
JBD2: I/O error when updating journal superblock for sdd-8.
__jbd2_log_wait_for_space: needed 256 blocks and only had 217 space available
__jbd2_log_wait_for_space: no way to get more journal space in sdd-8
------------[ cut here ]------------
WARNING: CPU: 2 PID: 139804 at fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0
Modules linked in:
CPU: 2 PID: 139804 Comm: kworker/u8:3 Not tainted 6.6.0+ #1
RIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0
Call Trace:
 &lt;TASK&gt;
 add_transaction_credits+0x5d1/0x5e0
 start_this_handle+0x1ef/0x6a0
 jbd2__journal_start+0x18b/0x340
 ext4_dirty_inode+0x5d/0xb0
 __mark_inode_dirty+0xe4/0x5d0
 generic_update_time+0x60/0x70
[...]
============================================

So only if jbd2_cleanup_journal_tail() returns 1, i.e., there is nothing to
clean up at the moment, continue to try to reclaim free space in other ways.

Note that this fix relies on commit 6f6a6fda2945 ("jbd2: fix ocfs2 corrupt
when updating journal superblock fails") to make jbd2_cleanup_journal_tail
return the correct error code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232149">SUSE bug 1232149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49960</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix timer use-after-free on failed mount

Syzbot has found an ODEBUG bug in ext4_fill_super

The del_timer_sync function cancels the s_err_report timer,
which reminds about filesystem errors daily. We should
guarantee the timer is no longer active before kfree(sbi).

When filesystem mounting fails, the flow goes to failed_mount3,
where an error occurs when ext4_stop_mmpd is called, causing
a read I/O failure. This triggers the ext4_handle_error function
that ultimately re-arms the timer,
leaving the s_err_report timer active before kfree(sbi) is called.

Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232803">SUSE bug 1232803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49962</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()

ACPICA commit 4d4547cf13cca820ff7e0f859ba83e1a610b9fd0

ACPI_ALLOCATE_ZEROED() may fail, elements might be NULL and will cause
NULL pointer dereference later.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232314">SUSE bug 1232314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49963</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: bcm2835: Fix timeout during suspend mode

During noirq suspend phase the Raspberry Pi power driver suffer of
firmware property timeouts. The reason is that the IRQ of the underlying
BCM2835 mailbox is disabled and rpi_firmware_property_list() will always
run into a timeout [1].

Since the VideoCore side isn't consider as a wakeup source, set the
IRQF_NO_SUSPEND flag for the mailbox IRQ in order to keep it enabled
during suspend-resume cycle.

[1]
PM: late suspend of devices complete after 1.754 msecs
WARNING: CPU: 0 PID: 438 at drivers/firmware/raspberrypi.c:128
 rpi_firmware_property_list+0x204/0x22c
Firmware transaction 0x00028001 timeout
Modules linked in:
CPU: 0 PID: 438 Comm: bash Tainted: G         C         6.9.3-dirty #17
Hardware name: BCM2835
Call trace:
unwind_backtrace from show_stack+0x18/0x1c
show_stack from dump_stack_lvl+0x34/0x44
dump_stack_lvl from __warn+0x88/0xec
__warn from warn_slowpath_fmt+0x7c/0xb0
warn_slowpath_fmt from rpi_firmware_property_list+0x204/0x22c
rpi_firmware_property_list from rpi_firmware_property+0x68/0x8c
rpi_firmware_property from rpi_firmware_set_power+0x54/0xc0
rpi_firmware_set_power from _genpd_power_off+0xe4/0x148
_genpd_power_off from genpd_sync_power_off+0x7c/0x11c
genpd_sync_power_off from genpd_finish_suspend+0xcc/0xe0
genpd_finish_suspend from dpm_run_callback+0x78/0xd0
dpm_run_callback from device_suspend_noirq+0xc0/0x238
device_suspend_noirq from dpm_suspend_noirq+0xb0/0x168
dpm_suspend_noirq from suspend_devices_and_enter+0x1b8/0x5ac
suspend_devices_and_enter from pm_suspend+0x254/0x2e4
pm_suspend from state_store+0xa8/0xd4
state_store from kernfs_fop_write_iter+0x154/0x1a0
kernfs_fop_write_iter from vfs_write+0x12c/0x184
vfs_write from ksys_write+0x78/0xc0
ksys_write from ret_fast_syscall+0x0/0x54
Exception stack(0xcc93dfa8 to 0xcc93dff0)
[...]
PM: noirq suspend of devices complete after 3095.584 msecs
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232147">SUSE bug 1232147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49965</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove unreasonable unlock in ocfs2_read_blocks

Patch series "Misc fixes for ocfs2_read_blocks", v5.

This series contains 2 fixes for ocfs2_read_blocks().  The first patch fix
the issue reported by syzbot, which detects bad unlock balance in
ocfs2_read_blocks().  The second patch fixes an issue reported by Heming
Zhao when reviewing above fix.


This patch (of 2):

There was a lock release before exiting, so remove the unreasonable unlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232142">SUSE bug 1232142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49966</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: cancel dqi_sync_work before freeing oinfo

ocfs2_global_read_info() will initialize and schedule dqi_sync_work at the
end, if error occurs after successfully reading global quota, it will
trigger the following warning with CONFIG_DEBUG_OBJECTS_* enabled:

ODEBUG: free active (active state 0) object: 00000000d8b0ce28 object type: timer_list hint: qsync_work_fn+0x0/0x16c

This reports that there is an active delayed work when freeing oinfo in
error handling, so cancel dqi_sync_work first.  BTW, return status instead
of -1 when .read_file_info fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232141">SUSE bug 1232141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49967</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232140">SUSE bug 1232140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49968</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: filesystems without casefold feature cannot be mounted with siphash

When mounting the ext4 filesystem, if the default hash version is set to
DX_HASH_SIPHASH but the casefold feature is not set, exit the mounting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232264">SUSE bug 1232264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49969</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in DCN30 color transformation

This commit addresses a potential index out of bounds issue in the
`cm3_helper_translate_curve_to_hw_format` function in the DCN30 color
management module. The issue could occur when the index 'i' exceeds the
number of transfer function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, the function returns
false to indicate an error.

drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:180 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:181 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:182 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232524">SUSE bug 1232524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49973</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: add tally counter fields added with RTL8125

RTL8125 added fields to the tally counter, what may result in the chip
dma'ing these new fields to unallocated memory. Therefore make sure
that the allocated memory area is big enough to hold all of the
tally counter values, even if we use only parts of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232105">SUSE bug 1232105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49974</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Limit the number of concurrent async COPY operations

Nothing appears to limit the number of concurrent async COPY
operations that clients can start. In addition, AFAICT each async
COPY can copy an unlimited number of 4MB chunks, so can run for a
long time. Thus IMO async COPY can become a DoS vector.

Add a restriction mechanism that bounds the number of concurrent
background COPY operations. Start simple and try to be fair -- this
patch implements a per-namespace limit.

An async COPY request that occurs while this limit is exceeded gets
NFS4ERR_DELAY. The requesting client can choose to send the request
again after a delay or fall back to a traditional read/write style
copy.

If there is need to make the mechanism more sophisticated, we can
visit that in future patches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232384">SUSE bug 1232384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49975</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uprobes: fix kernel info leak via "[uprobes]" vma

xol_add_vma() maps the uninitialized page allocated by __create_xol_area()
into userspace. On some architectures (x86) this memory is readable even
without VM_READ, VM_EXEC results in the same pgprot_t as VM_EXEC|VM_READ,
although this doesn't really matter, debugger can read this memory anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232104">SUSE bug 1232104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49981</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: fix use after free bug in venus_remove due to race condition

in venus_probe, core-&gt;work is bound with venus_sys_error_handler, which is
used to handle error. The code use core-&gt;sys_err_done to make sync work.
The core-&gt;work is started in venus_event_notify.

If we call venus_remove, there might be an unfished work. The possible
sequence is as follows:

CPU0                  CPU1

                     |venus_sys_error_handler
venus_remove         |
hfi_destroy	 		 |
venus_hfi_destroy	 |
kfree(hdev);	     |
                     |hfi_reinit
					 |venus_hfi_queues_reinit
                     |//use hdev

Fix it by canceling the work in venus_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232098">SUSE bug 1232098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49982</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in more places

For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential
use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put()
instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs
into use-after-free.

Then Nicolai Stange found more places in aoe have potential use-after-free
problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()
and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push
packet to tx queue. So they should also use dev_hold() to increase the
refcnt of skb-&gt;dev.

On the other hand, moving dev_put() to tx() causes that the refcnt of
skb-&gt;dev be reduced to a negative value, because corresponding
dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),
probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49983</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free

When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(),
the 'ppath' is updated but it is the 'path' that is freed, thus potentially
triggering a double-free in the following process:

ext4_ext_replay_update_ex
  ppath = path
  ext4_force_split_extent_at(&amp;ppath)
    ext4_split_extent_at
      ext4_ext_insert_extent
        ext4_ext_create_new_leaf
          ext4_ext_grow_indepth
            ext4_find_extent
              if (depth &gt; path[0].p_maxdepth)
                kfree(path)                 ---&gt; path First freed
                *orig_path = path = NULL    ---&gt; null ppath
  kfree(path)                               ---&gt; path double-free !!!

So drop the unnecessary ppath and use path directly to avoid this problem.
And use ext4_find_extent() directly to update path, avoiding unnecessary
memory allocation and freeing. Also, propagate the error returned by
ext4_find_extent() instead of using strange error codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232096">SUSE bug 1232096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49985</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume

In case there is any sort of clock controller attached to this I2C bus
controller, for example Versaclock or even an AIC32x4 I2C codec, then
an I2C transfer triggered from the clock controller clk_ops .prepare
callback may trigger a deadlock on drivers/clk/clk.c prepare_lock mutex.

This is because the clock controller first grabs the prepare_lock mutex
and then performs the prepare operation, including its I2C access. The
I2C access resumes this I2C bus controller via .runtime_resume callback,
which calls clk_prepare_enable(), which attempts to grab the prepare_lock
mutex again and deadlocks.

Since the clock are already prepared since probe() and unprepared in
remove(), use simple clk_enable()/clk_disable() calls to enable and
disable the clock on runtime suspend and resume, to avoid hitting the
prepare_lock mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232094">SUSE bug 1232094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49989</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix double free issue during amdgpu module unload

Flexible endpoints use DIGs from available inflexible endpoints,
so only the encoders of inflexible links need to be freed.
Otherwise, a double free issue may occur when unloading the
amdgpu module.

[  279.190523] RIP: 0010:__slab_free+0x152/0x2f0
[  279.190577] Call Trace:
[  279.190580]  &lt;TASK&gt;
[  279.190582]  ? show_regs+0x69/0x80
[  279.190590]  ? die+0x3b/0x90
[  279.190595]  ? do_trap+0xc8/0xe0
[  279.190601]  ? do_error_trap+0x73/0xa0
[  279.190605]  ? __slab_free+0x152/0x2f0
[  279.190609]  ? exc_invalid_op+0x56/0x70
[  279.190616]  ? __slab_free+0x152/0x2f0
[  279.190642]  ? asm_exc_invalid_op+0x1f/0x30
[  279.190648]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191096]  ? __slab_free+0x152/0x2f0
[  279.191102]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191469]  kfree+0x260/0x2b0
[  279.191474]  dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191821]  link_destroy+0xd7/0x130 [amdgpu]
[  279.192248]  dc_destruct+0x90/0x270 [amdgpu]
[  279.192666]  dc_destroy+0x19/0x40 [amdgpu]
[  279.193020]  amdgpu_dm_fini+0x16e/0x200 [amdgpu]
[  279.193432]  dm_hw_fini+0x26/0x40 [amdgpu]
[  279.193795]  amdgpu_device_fini_hw+0x24c/0x400 [amdgpu]
[  279.194108]  amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu]
[  279.194436]  amdgpu_pci_remove+0x40/0x80 [amdgpu]
[  279.194632]  pci_device_remove+0x3a/0xa0
[  279.194638]  device_remove+0x40/0x70
[  279.194642]  device_release_driver_internal+0x1ad/0x210
[  279.194647]  driver_detach+0x4e/0xa0
[  279.194650]  bus_remove_driver+0x6f/0xf0
[  279.194653]  driver_unregister+0x33/0x60
[  279.194657]  pci_unregister_driver+0x44/0x90
[  279.194662]  amdgpu_exit+0x19/0x1f0 [amdgpu]
[  279.194939]  __do_sys_delete_module.isra.0+0x198/0x2f0
[  279.194946]  __x64_sys_delete_module+0x16/0x20
[  279.194950]  do_syscall_64+0x58/0x120
[  279.194954]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[  279.194980]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232483">SUSE bug 1232483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49991</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer

Pass pointer reference to amdgpu_bo_unref to clear the correct pointer,
otherwise amdgpu_bo_unref clear the local variable, the original pointer
not set to NULL, this could cause use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232284">SUSE bug 1232284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49993</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232316">SUSE bug 1232316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49995</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: guard against string buffer overrun

Smatch reports that copying media_name and if_name to name_parts may
overwrite the destination.

 .../bearer.c:166 bearer_name_validate() error: strcpy() 'media_name' too large for 'name_parts-&gt;media_name' (32 vs 16)
 .../bearer.c:167 bearer_name_validate() error: strcpy() 'if_name' too large for 'name_parts-&gt;if_name' (1010102 vs 16)

This does seem to be the case so guard against this possibility by using
strscpy() and failing if truncation occurs.

Introduced by commit b97bf3fd8f6a ("[TIPC] Initial merge")

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232433">SUSE bug 1232433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49996</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49996" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix buffer overflow when parsing NFS reparse points

ReparseDataLength is sum of the InodeType size and DataBuffer size.
So to get DataBuffer size it is needed to subtract InodeType's size from
ReparseDataLength.

Function cifs_strndup_from_utf16() is currentlly accessing buf-&gt;DataBuffer
at position after the end of the buffer because it does not subtract
InodeType size from the length. Fix this problem and correctly subtract
variable len.

Member InodeType is present only when reparse buffer is large enough. Check
for ReparseDataLength before accessing InodeType to prevent another invalid
memory access.

Major and minor rdev values are present also only when reparse buffer is
large enough. Check for reparse buffer size before calling reparse_mkdev().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232089">SUSE bug 1232089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50000</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()

In mlx5e_tir_builder_alloc() kvzalloc() may return NULL
which is dereferenced on the next line in a reference
to the modify field.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232085">SUSE bug 1232085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50001</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix error path in multi-packet WQE transmit

Remove the erroneous unmap in case no DMA mapping was established

The multi-packet WQE transmit code attempts to obtain a DMA mapping for
the skb. This could fail, e.g. under memory pressure, when the IOMMU
driver just can't allocate more memory for page tables. While the code
tries to handle this in the path below the err_unmap label it erroneously
unmaps one entry from the sq's FIFO list of active mappings. Since the
current map attempt failed this unmap is removing some random DMA mapping
that might still be required. If the PCI function now presents that IOVA,
the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI
function in error state.

The erroneous behavior was seen in a stress-test environment that created
memory pressure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232084">SUSE bug 1232084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50002</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

static_call: Handle module init failure correctly in static_call_del_module()

Module insertion invokes static_call_add_module() to initialize the static
calls in a module. static_call_add_module() invokes __static_call_init(),
which allocates a struct static_call_mod to either encapsulate the built-in
static call sites of the associated key into it so further modules can be
added or to append the module to the module chain.

If that allocation fails the function returns with an error code and the
module core invokes static_call_del_module() to clean up eventually added
static_call_mod entries.

This works correctly, when all keys used by the module were converted over
to a module chain before the failure. If not then static_call_del_module()
causes a #GP as it blindly assumes that key::mods points to a valid struct
static_call_mod.

The problem is that key::mods is not a individual struct member of struct
static_call_key, it's part of a union to save space:

        union {
                /* bit 0: 0 = mods, 1 = sites */
                unsigned long type;
                struct static_call_mod *mods;
                struct static_call_site *sites;
	};

key::sites is a pointer to the list of built-in usage sites of the static
call. The type of the pointer is differentiated by bit 0. A mods pointer
has the bit clear, the sites pointer has the bit set.

As static_call_del_module() blidly assumes that the pointer is a valid
static_call_mod type, it fails to check for this failure case and
dereferences the pointer to the list of built-in call sites, which is
obviously bogus.

Cure it by checking whether the key has a sites or a mods pointer.

If it's a sites pointer then the key is not to be touched. As the sites are
walked in the same order as in __static_call_init() the site walk can be
terminated because all subsequent sites have not been touched by the init
code due to the error exit.

If it was converted before the allocation fail, then the inner loop which
searches for a module match will find nothing.

A fail in the second allocation in __static_call_init() is harmless and
does not require special treatment. The first allocation succeeded and
converted the key to a module chain. That first entry has mod::mod == NULL
and mod::next == NULL, so the inner loop of static_call_del_module() will
neither find a module match nor a module chain. The next site in the walk
was either already converted, but can't match the module, or it will exit
the outer loop because it has a static_call_site pointer and not a
static_call_mod pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232083">SUSE bug 1232083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50003</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix system hang while resume with TBT monitor

[Why]
Connected with a Thunderbolt monitor and do the suspend and the system
may hang while resume.

The TBT monitor HPD will be triggered during the resume procedure
and call the drm_client_modeset_probe() while
struct drm_connector connector-&gt;dev-&gt;master is NULL.

It will mess up the pipe topology after resume.

[How]
Skip the TBT monitor HPD during the resume procedure because we
currently will probe the connectors after resume by default.

(cherry picked from commit 453f86a26945207a16b8f66aaed5962dc2b95b85)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232385">SUSE bug 1232385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix i_data_sem unlock order in ext4_ind_migrate()

Fuzzing reports a possible deadlock in jbd2_log_wait_commit.

This issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require
synchronous updates because the file descriptor is opened with O_SYNC.
This can lead to the jbd2_journal_stop() function calling
jbd2_might_wait_for_commit(), potentially causing a deadlock if the
EXT4_IOC_MIGRATE call races with a write(2) system call.

This problem only arises when CONFIG_PROVE_LOCKING is enabled. In this
case, the jbd2_might_wait_for_commit macro locks jbd2_handle in the
jbd2_journal_stop function while i_data_sem is locked. This triggers
lockdep because the jbd2_journal_start function might also lock the same
jbd2_handle simultaneously.

Found by Linux Verification Center (linuxtesting.org) with syzkaller.

Rule: add
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232442">SUSE bug 1232442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50007</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: asihpi: Fix potential OOB array access

ASIHPI driver stores some values in the static array upon a response
from the driver, and its index depends on the firmware.  We shouldn't
trust it blindly.

This patch adds a sanity check of the array index to fit in the array
size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232394">SUSE bug 1232394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50008</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()

Replace one-element array with a flexible-array member in
`struct host_cmd_ds_802_11_scan_ext`.

With this, fix the following warning:

elo 16 17:51:58 surfacebook kernel: ------------[ cut here ]------------
elo 16 17:51:58 surfacebook kernel: memcpy: detected field-spanning write (size 243) of single field "ext_scan-&gt;tlv_buffer" at drivers/net/wireless/marvell/mwifiex/scan.c:2239 (size 1)
elo 16 17:51:58 surfacebook kernel: WARNING: CPU: 0 PID: 498 at drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232317">SUSE bug 1232317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50009</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232318">SUSE bug 1232318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50013</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix memory leak in exfat_load_bitmap()

If the first directory entry in the root directory is not a bitmap
directory entry, 'bh' will not be released and reassigned, which
will cause a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232080">SUSE bug 1232080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50014</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix access to uninitialised lock in fc replay path

The following kernel trace can be triggered with fstest generic/629 when
executed against a filesystem with fast-commit feature enabled:

INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 0 PID: 866 Comm: mount Not tainted 6.10.0+ #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x66/0x90
 register_lock_class+0x759/0x7d0
 __lock_acquire+0x85/0x2630
 ? __find_get_block+0xb4/0x380
 lock_acquire+0xd1/0x2d0
 ? __ext4_journal_get_write_access+0xd5/0x160
 _raw_spin_lock+0x33/0x40
 ? __ext4_journal_get_write_access+0xd5/0x160
 __ext4_journal_get_write_access+0xd5/0x160
 ext4_reserve_inode_write+0x61/0xb0
 __ext4_mark_inode_dirty+0x79/0x270
 ? ext4_ext_replay_set_iblocks+0x2f8/0x450
 ext4_ext_replay_set_iblocks+0x330/0x450
 ext4_fc_replay+0x14c8/0x1540
 ? jread+0x88/0x2e0
 ? rcu_is_watching+0x11/0x40
 do_one_pass+0x447/0xd00
 jbd2_journal_recover+0x139/0x1b0
 jbd2_journal_load+0x96/0x390
 ext4_load_and_init_journal+0x253/0xd40
 ext4_fill_super+0x2cc6/0x3180
...

In the replay path there's an attempt to lock sbi-&gt;s_bdev_wb_lock in
function ext4_check_bdev_write_error().  Unfortunately, at this point this
spinlock has not been initialized yet.  Moving it's initialization to an
earlier point in __ext4_fill_super() fixes this splat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232446">SUSE bug 1232446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50017</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm/ident_map: Use gbpages only where full GB page should be mapped.

When ident_pud_init() uses only GB pages to create identity maps, large
ranges of addresses not actually requested can be included in the resulting
table; a 4K request will map a full GB.  This can include a lot of extra
address space past that requested, including areas marked reserved by the
BIOS.  That allows processor speculation into reserved regions, that on UV
systems can cause system halts.

Only use GB pages when map creation requests include the full GB page of
space.  Fall back to using smaller 2M pages when only portions of a GB page
are included in the request.

No attempt is made to coalesce mapping requests. If a request requires a
map entry at the 2M (pmd) level, subsequent mapping requests within the
same 1G region will also be at the pmd level, even if adjacent or
overlapping such requests could have been combined to map a full GB page.
Existing usage starts with larger regions and then adds smaller regions, so
this should not have any great consequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232312">SUSE bug 1232312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50019</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kthread: unpark only parked kthread

Calling into kthread unparking unconditionally is mostly harmless when
the kthread is already unparked. The wake up is then simply ignored
because the target is not in TASK_PARKED state.

However if the kthread is per CPU, the wake up is preceded by a call
to kthread_bind() which expects the task to be inactive and in
TASK_PARKED state, which obviously isn't the case if it is unparked.

As a result, calling kthread_stop() on an unparked per-cpu kthread
triggers such a warning:

	WARNING: CPU: 0 PID: 11 at kernel/kthread.c:525 __kthread_bind_mask kernel/kthread.c:525
	 &lt;TASK&gt;
	 kthread_stop+0x17a/0x630 kernel/kthread.c:707
	 destroy_workqueue+0x136/0xc40 kernel/workqueue.c:5810
	 wg_destruct+0x1e2/0x2e0 drivers/net/wireguard/device.c:257
	 netdev_run_todo+0xe1a/0x1000 net/core/dev.c:10693
	 default_device_exit_batch+0xa14/0xa90 net/core/dev.c:11769
	 ops_exit_list net/core/net_namespace.c:178 [inline]
	 cleanup_net+0x89d/0xcc0 net/core/net_namespace.c:640
	 process_one_work kernel/workqueue.c:3231 [inline]
	 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
	 worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
	 kthread+0x2f0/0x390 kernel/kthread.c:389
	 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
	 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
	 &lt;/TASK&gt;

Fix this with skipping unecessary unparking while stopping a kthread.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231990">SUSE bug 1231990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50024</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix an unsafe loop on the list

The kernel may crash when deleting a genetlink family if there are still
listeners for that family:

Oops: Kernel access of bad area, sig: 11 [#1]
  ...
  NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0
  LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0
  Call Trace:
__netlink_clear_multicast_users+0x74/0xc0
genl_unregister_family+0xd4/0x2d0

Change the unsafe loop on the list to a safe one, because inside the
loop there is an element removal from this list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231954">SUSE bug 1231954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50025</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: fnic: Move flush_work initialization out of if block

After commit 379a58caa199 ("scsi: fnic: Move fnic_fnic_flush_tx() to a
work queue"), it can happen that a work item is sent to an uninitialized
work queue.  This may has the effect that the item being queued is never
actually queued, and any further actions depending on it will not
proceed.

The following warning is observed while the fnic driver is loaded:

kernel: WARNING: CPU: 11 PID: 0 at ../kernel/workqueue.c:1524 __queue_work+0x373/0x410
kernel:  &lt;IRQ&gt;
kernel:  queue_work_on+0x3a/0x50
kernel:  fnic_wq_copy_cmpl_handler+0x54a/0x730 [fnic 62fbff0c42e7fb825c60a55cde2fb91facb2ed24]
kernel:  fnic_isr_msix_wq_copy+0x2d/0x60 [fnic 62fbff0c42e7fb825c60a55cde2fb91facb2ed24]
kernel:  __handle_irq_event_percpu+0x36/0x1a0
kernel:  handle_irq_event_percpu+0x30/0x70
kernel:  handle_irq_event+0x34/0x60
kernel:  handle_edge_irq+0x7e/0x1a0
kernel:  __common_interrupt+0x3b/0xb0
kernel:  common_interrupt+0x58/0xa0
kernel:  &lt;/IRQ&gt;

It has been observed that this may break the rediscovery of Fibre
Channel devices after a temporary fabric failure.

This patch fixes it by moving the work queue initialization out of
an if block in fnic_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231953">SUSE bug 1231953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50026</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: wd33c93: Don't use stale scsi_pointer value

A regression was introduced with commit dbb2da557a6a ("scsi: wd33c93:
Move the SCSI pointer to private command data") which results in an oops
in wd33c93_intr(). That commit added the scsi_pointer variable and
initialized it from hostdata-&gt;connected. However, during selection,
hostdata-&gt;connected is not yet valid. Fix this by getting the current
scsi_pointer from hostdata-&gt;selecting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231952">SUSE bug 1231952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50028</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Reference count the zone in thermal_zone_get_by_id()

There are places in the thermal netlink code where nothing prevents
the thermal zone object from going away while being accessed after it
has been returned by thermal_zone_get_by_id().

To address this, make thermal_zone_get_by_id() get a reference on the
thermal zone device object to be returned with the help of get_device(),
under thermal_list_lock, and adjust all of its callers to this change
with the help of the cleanup.h infrastructure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231950">SUSE bug 1231950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50031</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Stop the active perfmon before being destroyed

When running `kmscube` with one or more performance monitors enabled
via `GALLIUM_HUD`, the following kernel panic can occur:

[   55.008324] Unable to handle kernel paging request at virtual address 00000000052004a4
[   55.008368] Mem abort info:
[   55.008377]   ESR = 0x0000000096000005
[   55.008387]   EC = 0x25: DABT (current EL), IL = 32 bits
[   55.008402]   SET = 0, FnV = 0
[   55.008412]   EA = 0, S1PTW = 0
[   55.008421]   FSC = 0x05: level 1 translation fault
[   55.008434] Data abort info:
[   55.008442]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[   55.008455]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   55.008467]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   55.008481] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001046c6000
[   55.008497] [00000000052004a4] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[   55.008525] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   55.008542] Modules linked in: rfcomm [...] vc4 v3d snd_soc_hdmi_codec drm_display_helper
gpu_sched drm_shmem_helper cec drm_dma_helper drm_kms_helper i2c_brcmstb
drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd backlight
[   55.008799] CPU: 2 PID: 166 Comm: v3d_bin Tainted: G         C         6.6.47+rpt-rpi-v8 #1  Debian 1:6.6.47-1+rpt1
[   55.008824] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)
[   55.008838] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   55.008855] pc : __mutex_lock.constprop.0+0x90/0x608
[   55.008879] lr : __mutex_lock.constprop.0+0x58/0x608
[   55.008895] sp : ffffffc080673cf0
[   55.008904] x29: ffffffc080673cf0 x28: 0000000000000000 x27: ffffff8106188a28
[   55.008926] x26: ffffff8101e78040 x25: ffffff8101baa6c0 x24: ffffffd9d989f148
[   55.008947] x23: ffffffda1c2a4008 x22: 0000000000000002 x21: ffffffc080673d38
[   55.008968] x20: ffffff8101238000 x19: ffffff8104f83188 x18: 0000000000000000
[   55.008988] x17: 0000000000000000 x16: ffffffda1bd04d18 x15: 00000055bb08bc90
[   55.009715] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffda1bd4cbb0
[   55.010433] x11: 00000000fa83b2da x10: 0000000000001a40 x9 : ffffffda1bd04d04
[   55.011162] x8 : ffffff8102097b80 x7 : 0000000000000000 x6 : 00000000030a5857
[   55.011880] x5 : 00ffffffffffffff x4 : 0300000005200470 x3 : 0300000005200470
[   55.012598] x2 : ffffff8101238000 x1 : 0000000000000021 x0 : 0300000005200470
[   55.013292] Call trace:
[   55.013959]  __mutex_lock.constprop.0+0x90/0x608
[   55.014646]  __mutex_lock_slowpath+0x1c/0x30
[   55.015317]  mutex_lock+0x50/0x68
[   55.015961]  v3d_perfmon_stop+0x40/0xe0 [v3d]
[   55.016627]  v3d_bin_job_run+0x10c/0x2d8 [v3d]
[   55.017282]  drm_sched_main+0x178/0x3f8 [gpu_sched]
[   55.017921]  kthread+0x11c/0x128
[   55.018554]  ret_from_fork+0x10/0x20
[   55.019168] Code: f9400260 f1001c1f 54001ea9 927df000 (b9403401)
[   55.019776] ---[ end trace 0000000000000000 ]---
[   55.020411] note: v3d_bin[166] exited with preempt_count 1

This issue arises because, upon closing the file descriptor (which happens
when we interrupt `kmscube`), the active performance monitor is not
stopped. Although all perfmons are destroyed in `v3d_perfmon_close_file()`,
the active performance monitor's pointer (`v3d-&gt;active_perfmon`) is still
retained.

If `kmscube` is run again, the driver will attempt to stop the active
performance monitor using the stale pointer in `v3d-&gt;active_perfmon`.
However, this pointer is no longer valid because the previous process has
already terminated, and all performance monitors associated with it have
been destroyed and freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231947">SUSE bug 1231947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50033</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50033" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

slip: make slhc_remember() more robust against malicious packets

syzbot found that slhc_remember() was missing checks against
malicious packets [1].

slhc_remember() only checked the size of the packet was at least 20,
which is not good enough.

We need to make sure the packet includes the IPv4 and TCP header
that are supposed to be carried.

Add iph and th pointers to make the code more readable.

[1]

BUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666
  slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666
  ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455
  ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]
  ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212
  ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327
  pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113
  __release_sock+0x1da/0x330 net/core/sock.c:3072
  release_sock+0x6b/0x250 net/core/sock.c:3626
  pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4091 [inline]
  slab_alloc_node mm/slub.c:4134 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1322 [inline]
  sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732
  pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231914">SUSE bug 1231914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50035</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50035" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: fix ppp_async_encode() illegal access

syzbot reported an issue in ppp_async_encode() [1]

In this case, pppoe_sendmsg() is called with a zero size.
Then ppp_async_encode() is called with an empty skb.

BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]
 BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675
  ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]
  ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675
  ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634
  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]
  ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304
  pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113
  __release_sock+0x1da/0x330 net/core/sock.c:3072
  release_sock+0x6b/0x250 net/core/sock.c:3626
  pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4092 [inline]
  slab_alloc_node mm/slub.c:4135 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1322 [inline]
  sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732
  pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232392">SUSE bug 1232392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50041</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix macvlan leak by synchronizing access to mac_filter_hash

This patch addresses a macvlan leak issue in the i40e driver caused by
concurrent access to vsi-&gt;mac_filter_hash. The leak occurs when multiple
threads attempt to modify the mac_filter_hash simultaneously, leading to
inconsistent state and potential memory leaks.

To fix this, we now wrap the calls to i40e_del_mac_filter() and zeroing
vf-&gt;default_lan_addr.addr with spin_lock/unlock_bh(&amp;vsi-&gt;mac_filter_hash_lock),
ensuring atomic operations and preventing concurrent access.

Additionally, we add lockdep_assert_held(&amp;vsi-&gt;mac_filter_hash_lock) in
i40e_add_mac_filter() to help catch similar issues in the future.

Reproduction steps:
1. Spawn VFs and configure port vlan on them.
2. Trigger concurrent macvlan operations (e.g., adding and deleting
	portvlan and/or mac filters).
3. Observe the potential memory leak and inconsistent state in the
	mac_filter_hash.

This synchronization ensures the integrity of the mac_filter_hash and prevents
the described leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231907">SUSE bug 1231907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50044</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change

rfcomm_sk_state_change attempts to use sock_lock so it must never be
called with it locked but rfcomm_sock_ioctl always attempt to lock it
causing the following trace:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted
------------------------------------------------------
syz-executor386/5093 is trying to acquire lock:
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline]
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73

but task is already holding lock:
ffff88807badfd28 (&amp;d-&gt;lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231904">SUSE bug 1231904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50045</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: br_netfilter: fix panic with metadata_dst skb

Fix a kernel panic in the br_netfilter module when sending untagged
traffic via a VxLAN device.
This happens during the check for fragmentation in br_nf_dev_queue_xmit.

It is dependent on:
1) the br_netfilter module being loaded;
2) net.bridge.bridge-nf-call-iptables set to 1;
3) a bridge with a VxLAN (single-vxlan-device) netdevice as a bridge port;
4) untagged frames with size higher than the VxLAN MTU forwarded/flooded

When forwarding the untagged packet to the VxLAN bridge port, before
the netfilter hooks are called, br_handle_egress_vlan_tunnel is called and
changes the skb_dst to the tunnel dst. The tunnel_dst is a metadata type
of dst, i.e., skb_valid_dst(skb) is false, and metadata-&gt;dst.dev is NULL.

Then in the br_netfilter hooks, in br_nf_dev_queue_xmit, there's a check
for frames that needs to be fragmented: frames with higher MTU than the
VxLAN device end up calling br_nf_ip_fragment, which in turns call
ip_skb_dst_mtu.

The ip_dst_mtu tries to use the skb_dst(skb) as if it was a valid dst
with valid dst-&gt;dev, thus the crash.

This case was never supported in the first place, so drop the packet
instead.

PING 10.0.0.2 (10.0.0.2) from 0.0.0.0 h1-eth0: 2000(2028) bytes of data.
[  176.291791] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000110
[  176.292101] Mem abort info:
[  176.292184]   ESR = 0x0000000096000004
[  176.292322]   EC = 0x25: DABT (current EL), IL = 32 bits
[  176.292530]   SET = 0, FnV = 0
[  176.292709]   EA = 0, S1PTW = 0
[  176.292862]   FSC = 0x04: level 0 translation fault
[  176.293013] Data abort info:
[  176.293104]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[  176.293488]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  176.293787]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  176.293995] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000043ef5000
[  176.294166] [0000000000000110] pgd=0000000000000000,
p4d=0000000000000000
[  176.294827] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[  176.295252] Modules linked in: vxlan ip6_udp_tunnel udp_tunnel veth
br_netfilter bridge stp llc ipv6 crct10dif_ce
[  176.295923] CPU: 0 PID: 188 Comm: ping Not tainted
6.8.0-rc3-g5b3fbd61b9d1 #2
[  176.296314] Hardware name: linux,dummy-virt (DT)
[  176.296535] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS
BTYPE=--)
[  176.296808] pc : br_nf_dev_queue_xmit+0x390/0x4ec [br_netfilter]
[  176.297382] lr : br_nf_dev_queue_xmit+0x2ac/0x4ec [br_netfilter]
[  176.297636] sp : ffff800080003630
[  176.297743] x29: ffff800080003630 x28: 0000000000000008 x27:
ffff6828c49ad9f8
[  176.298093] x26: ffff6828c49ad000 x25: 0000000000000000 x24:
00000000000003e8
[  176.298430] x23: 0000000000000000 x22: ffff6828c4960b40 x21:
ffff6828c3b16d28
[  176.298652] x20: ffff6828c3167048 x19: ffff6828c3b16d00 x18:
0000000000000014
[  176.298926] x17: ffffb0476322f000 x16: ffffb7e164023730 x15:
0000000095744632
[  176.299296] x14: ffff6828c3f1c880 x13: 0000000000000002 x12:
ffffb7e137926a70
[  176.299574] x11: 0000000000000001 x10: ffff6828c3f1c898 x9 :
0000000000000000
[  176.300049] x8 : ffff6828c49bf070 x7 : 0008460f18d5f20e x6 :
f20e0100bebafeca
[  176.300302] x5 : ffff6828c7f918fe x4 : ffff6828c49bf070 x3 :
0000000000000000
[  176.300586] x2 : 0000000000000000 x1 : ffff6828c3c7ad00 x0 :
ffff6828c7f918f0
[  176.300889] Call trace:
[  176.301123]  br_nf_dev_queue_xmit+0x390/0x4ec [br_netfilter]
[  176.301411]  br_nf_post_routing+0x2a8/0x3e4 [br_netfilter]
[  176.301703]  nf_hook_slow+0x48/0x124
[  176.302060]  br_forward_finish+0xc8/0xe8 [bridge]
[  176.302371]  br_nf_hook_thresh+0x124/0x134 [br_netfilter]
[  176.302605]  br_nf_forward_finish+0x118/0x22c [br_netfilter]
[  176.302824]  br_nf_forward_ip.part.0+0x264/0x290 [br_netfilter]
[  176.303136]  br_nf_forward+0x2b8/0x4e0 [br_netfilter]
[  176.303359]  nf_hook_slow+0x48/0x124
[  176.303
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231903">SUSE bug 1231903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50046</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()

On the node of an NFS client, some files saved in the mountpoint of the
NFS server were copied to another location of the same NFS server.
Accidentally, the nfs42_complete_copies() got a NULL-pointer dereference
crash with the following syslog:

[232064.838881] NFSv4: state recovery failed for open file nfs/pvc-12b5200d-cd0f-46a3-b9f0-af8f4fe0ef64.qcow2, error = -116
[232064.839360] NFSv4: state recovery failed for open file nfs/pvc-12b5200d-cd0f-46a3-b9f0-af8f4fe0ef64.qcow2, error = -116
[232066.588183] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000058
[232066.588586] Mem abort info:
[232066.588701]   ESR = 0x0000000096000007
[232066.588862]   EC = 0x25: DABT (current EL), IL = 32 bits
[232066.589084]   SET = 0, FnV = 0
[232066.589216]   EA = 0, S1PTW = 0
[232066.589340]   FSC = 0x07: level 3 translation fault
[232066.589559] Data abort info:
[232066.589683]   ISV = 0, ISS = 0x00000007
[232066.589842]   CM = 0, WnR = 0
[232066.589967] user pgtable: 64k pages, 48-bit VAs, pgdp=00002000956ff400
[232066.590231] [0000000000000058] pgd=08001100ae100003, p4d=08001100ae100003, pud=08001100ae100003, pmd=08001100b3c00003, pte=0000000000000000
[232066.590757] Internal error: Oops: 96000007 [#1] SMP
[232066.590958] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs ocfs2_dlmfs ocfs2_stack_o2cb ocfs2_dlm vhost_net vhost vhost_iotlb tap tun ipt_rpfilter xt_multiport ip_set_hash_ip ip_set_hash_net xfrm_interface xfrm6_tunnel tunnel4 tunnel6 esp4 ah4 wireguard libcurve25519_generic veth xt_addrtype xt_set nf_conntrack_netlink ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_bitmap_port ip_set_hash_ipport dummy ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs iptable_filter sch_ingress nfnetlink_cttimeout vport_gre ip_gre ip_tunnel gre vport_geneve geneve vport_vxlan vxlan ip6_udp_tunnel udp_tunnel openvswitch nf_conncount dm_round_robin dm_service_time dm_multipath xt_nat xt_MASQUERADE nft_chain_nat nf_nat xt_mark xt_conntrack xt_comment nft_compat nft_counter nf_tables nfnetlink ocfs2 ocfs2_nodemanager ocfs2_stackglue iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ipmi_ssif nbd overlay 8021q garp mrp bonding tls rfkill sunrpc ext4 mbcache jbd2
[232066.591052]  vfat fat cas_cache cas_disk ses enclosure scsi_transport_sas sg acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler ip_tables vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio dm_mirror dm_region_hash dm_log dm_mod nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter bridge stp llc fuse xfs libcrc32c ast drm_vram_helper qla2xxx drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce fb_sys_fops cec sha256_arm64 sha1_ce drm_ttm_helper ttm nvme_fc igb sbsa_gwdt nvme_fabrics drm nvme_core i2c_algo_bit i40e scsi_transport_fc megaraid_sas aes_neon_bs
[232066.596953] CPU: 6 PID: 4124696 Comm: 10.253.166.125- Kdump: loaded Not tainted 5.15.131-9.cl9_ocfs2.aarch64 #1
[232066.597356] Hardware name: Great Wall .\x93\x8e...RF6260 V5/GWMSSE2GL1T, BIOS T656FBE_V3.0.18 2024-01-06
[232066.597721] pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[232066.598034] pc : nfs4_reclaim_open_state+0x220/0x800 [nfsv4]
[232066.598327] lr : nfs4_reclaim_open_state+0x12c/0x800 [nfsv4]
[232066.598595] sp : ffff8000f568fc70
[232066.598731] x29: ffff8000f568fc70 x28: 0000000000001000 x27: ffff21003db33000
[232066.599030] x26: ffff800005521ae0 x25: ffff0100f98fa3f0 x24: 0000000000000001
[232066.599319] x23: ffff800009920008 x22: ffff21003db33040 x21: ffff21003db33050
[232066.599628] x20: ffff410172fe9e40 x19: ffff410172fe9e00 x18: 0000000000000000
[232066.599914] x17: 0000000000000000 x16: 0000000000000004 x15: 0000000000000000
[232066.600195] x14: 0000000000000000 x13: ffff800008e685a8 x12: 00000000eac0c6e6
[232066.600498] x11: 00000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231902">SUSE bug 1231902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50047</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in async decryption

Doing an async decryption (large read) crashes with a
slab-use-after-free way down in the crypto API.

Reproducer:
    # mount.cifs -o ...,seal,esize=1 //srv/share /mnt
    # dd if=/mnt/largefile of=/dev/null
    ...
    [  194.196391] ==================================================================
    [  194.196844] BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xc1/0x110
    [  194.197269] Read of size 8 at addr ffff888112bd0448 by task kworker/u77:2/899
    [  194.197707]
    [  194.197818] CPU: 12 UID: 0 PID: 899 Comm: kworker/u77:2 Not tainted 6.11.0-lku-00028-gfca3ca14a17a-dirty #43
    [  194.198400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
    [  194.199046] Workqueue: smb3decryptd smb2_decrypt_offload [cifs]
    [  194.200032] Call Trace:
    [  194.200191]  &lt;TASK&gt;
    [  194.200327]  dump_stack_lvl+0x4e/0x70
    [  194.200558]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.200809]  print_report+0x174/0x505
    [  194.201040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
    [  194.201352]  ? srso_return_thunk+0x5/0x5f
    [  194.201604]  ? __virt_addr_valid+0xdf/0x1c0
    [  194.201868]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202128]  kasan_report+0xc8/0x150
    [  194.202361]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202616]  gf128mul_4k_lle+0xc1/0x110
    [  194.202863]  ghash_update+0x184/0x210
    [  194.203103]  shash_ahash_update+0x184/0x2a0
    [  194.203377]  ? __pfx_shash_ahash_update+0x10/0x10
    [  194.203651]  ? srso_return_thunk+0x5/0x5f
    [  194.203877]  ? crypto_gcm_init_common+0x1ba/0x340
    [  194.204142]  gcm_hash_assoc_remain_continue+0x10a/0x140
    [  194.204434]  crypt_message+0xec1/0x10a0 [cifs]
    [  194.206489]  ? __pfx_crypt_message+0x10/0x10 [cifs]
    [  194.208507]  ? srso_return_thunk+0x5/0x5f
    [  194.209205]  ? srso_return_thunk+0x5/0x5f
    [  194.209925]  ? srso_return_thunk+0x5/0x5f
    [  194.210443]  ? srso_return_thunk+0x5/0x5f
    [  194.211037]  decrypt_raw_data+0x15f/0x250 [cifs]
    [  194.212906]  ? __pfx_decrypt_raw_data+0x10/0x10 [cifs]
    [  194.214670]  ? srso_return_thunk+0x5/0x5f
    [  194.215193]  smb2_decrypt_offload+0x12a/0x6c0 [cifs]

This is because TFM is being used in parallel.

Fix this by allocating a new AEAD TFM for async decryption, but keep
the existing one for synchronous READ cases (similar to what is done
in smb3_calc_signature()).

Also remove the calls to aead_request_set_callback() and
crypto_wait_req() since it's always going to be a synchronous operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232576">SUSE bug 1232576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232638">SUSE bug 1232638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50048</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: Fix a NULL pointer dereference issue in fbcon_putcs

syzbot has found a NULL pointer dereference bug in fbcon.
Here is the simplified C reproducer:

struct param {
	uint8_t type;
	struct tiocl_selection ts;
};

int main()
{
	struct fb_con2fbmap con2fb;
	struct param param;

	int fd = open("/dev/fb1", 0, 0);

	con2fb.console = 0x19;
	con2fb.framebuffer = 0;
	ioctl(fd, FBIOPUT_CON2FBMAP, &amp;con2fb);

	param.type = 2;
	param.ts.xs = 0; param.ts.ys = 0;
	param.ts.xe = 0; param.ts.ye = 0;
	param.ts.sel_mode = 0;

	int fd1 = open("/dev/tty1", O_RDWR, 0);
	ioctl(fd1, TIOCLINUX, &amp;param);

	con2fb.console = 1;
	con2fb.framebuffer = 0;
	ioctl(fd, FBIOPUT_CON2FBMAP, &amp;con2fb);

	return 0;
}

After calling ioctl(fd1, TIOCLINUX, &amp;param), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &amp;con2fb)
causes the kernel to follow a different execution path:

 set_con2fb_map
  -&gt; con2fb_init_display
   -&gt; fbcon_set_disp
    -&gt; redraw_screen
     -&gt; hide_cursor
      -&gt; clear_selection
       -&gt; highlight
        -&gt; invert_screen
         -&gt; do_update_region
          -&gt; fbcon_putcs
           -&gt; ops-&gt;putcs

Since ops-&gt;putcs is a NULL pointer, this leads to a kernel panic.
To prevent this, we need to call set_blitting_type() within set_con2fb_map()
to properly initialize ops-&gt;putcs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232310">SUSE bug 1232310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50049</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointer before dereferencing se

[WHAT &amp; HOW]
se is null checked previously in the same function, indicating
it might be null; therefore, it must be checked when used again.

This fixes 1 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232309">SUSE bug 1232309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50055</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: bus: Fix double free in driver API bus_register()

For bus_register(), any error which happens after kset_register() will
cause that @priv are freed twice, fixed by setting @priv with NULL after
the first free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232329">SUSE bug 1232329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50058</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: protect uart_port_dtr_rts() in uart_shutdown() too

Commit af224ca2df29 (serial: core: Prevent unsafe uart port access, part
3) added few uport == NULL checks. It added one to uart_shutdown(), so
the commit assumes, uport can be NULL in there. But right after that
protection, there is an unprotected "uart_port_dtr_rts(uport, false);"
call. That is invoked only if HUPCL is set, so I assume that is the
reason why we do not see lots of these reports.

Or it cannot be NULL at this point at all for some reason :P.

Until the above is investigated, stay on the safe side and move this
dereference to the if too.

I got this inconsistency from Coverity under CID 1585130. Thanks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232285">SUSE bug 1232285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50059</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition

In the switchtec_ntb_add function, it can call switchtec_ntb_init_sndev
function, then &amp;sndev-&gt;check_link_status_work is bound with
check_link_status_work. switchtec_ntb_link_notification may be called
to start the work.

If we remove the module which will call switchtec_ntb_remove to make
cleanup, it will free sndev through kfree(sndev), while the work
mentioned above will be used. The sequence of operations that may lead
to a UAF bug is as follows:

CPU0                                 CPU1

                        | check_link_status_work
switchtec_ntb_remove    |
kfree(sndev);           |
                        | if (sndev-&gt;link_force_down)
                        | // use sndev

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in switchtec_ntb_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232345">SUSE bug 1232345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232348">SUSE bug 1232348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50061</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition

In the cdns_i3c_master_probe function, &amp;master-&gt;hj_work is bound with
cdns_i3c_master_hj. And cdns_i3c_master_interrupt can call
cnds_i3c_master_demux_ibis function to start the work.

If we remove the module which will call cdns_i3c_master_remove to
make cleanup, it will free master-&gt;base through i3c_master_unregister
while the work mentioned above will be used. The sequence of operations
that may lead to a UAF bug is as follows:

CPU0                                      CPU1

                                     | cdns_i3c_master_hj
cdns_i3c_master_remove               |
i3c_master_unregister(&amp;master-&gt;base) |
device_unregister(&amp;master-&gt;dev)      |
device_release                       |
//free master-&gt;base                  |
                                     | i3c_master_do_daa(&amp;master-&gt;base)
                                     | //use master-&gt;base

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in cdns_i3c_master_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232263">SUSE bug 1232263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50062</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-srv: Avoid null pointer deref during path establishment

For RTRS path establishment, RTRS client initiates and completes con_num
of connections. After establishing all its connections, the information
is exchanged between the client and server through the info_req message.
During this exchange, it is essential that all connections have been
established, and the state of the RTRS srv path is CONNECTED.

So add these sanity checks, to make sure we detect and abort process in
error scenarios to avoid null pointer deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232232">SUSE bug 1232232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50063</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50063" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Prevent tail call between progs attached to different hooks

bpf progs can be attached to kernel functions, and the attached functions
can take different parameters or return different return values. If
prog attached to one kernel function tail calls prog attached to another
kernel function, the ctx access or return value verification could be
bypassed.

For example, if prog1 is attached to func1 which takes only 1 parameter
and prog2 is attached to func2 which takes two parameters. Since verifier
assumes the bpf ctx passed to prog2 is constructed based on func2's
prototype, verifier allows prog2 to access the second parameter from
the bpf ctx passed to it. The problem is that verifier does not prevent
prog1 from passing its bpf ctx to prog2 via tail call. In this case,
the bpf ctx passed to prog2 is constructed from func1 instead of func2,
that is, the assumption for ctx access verification is bypassed.

Another example, if BPF LSM prog1 is attached to hook file_alloc_security,
and BPF LSM prog2 is attached to hook bpf_lsm_audit_rule_known. Verifier
knows the return value rules for these two hooks, e.g. it is legal for
bpf_lsm_audit_rule_known to return positive number 1, and it is illegal
for file_alloc_security to return positive number. So verifier allows
prog2 to return positive number 1, but does not allow prog1 to return
positive number. The problem is that verifier does not prevent prog1
from calling prog2 via tail call. In this case, prog2's return value 1
will be used as the return value for prog1's hook file_alloc_security.
That is, the return value rule is bypassed.

This patch adds restriction for tail call to prevent such bypasses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232435">SUSE bug 1232435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50067</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uprobe: avoid out-of-bounds memory access of fetching args

Uprobe needs to fetch args into a percpu buffer, and then copy to ring
buffer to avoid non-atomic context problem.

Sometimes user-space strings, arrays can be very large, but the size of
percpu buffer is only page size. And store_trace_args() won't check
whether these data exceeds a single page or not, caused out-of-bounds
memory access.

It could be reproduced by following steps:
1. build kernel with CONFIG_KASAN enabled
2. save follow program as test.c

```
\#include &lt;stdio.h&gt;
\#include &lt;stdlib.h&gt;
\#include &lt;string.h&gt;

// If string length large than MAX_STRING_SIZE, the fetch_store_strlen()
// will return 0, cause __get_data_size() return shorter size, and
// store_trace_args() will not trigger out-of-bounds access.
// So make string length less than 4096.
\#define STRLEN 4093

void generate_string(char *str, int n)
{
    int i;
    for (i = 0; i &lt; n; ++i)
    {
        char c = i % 26 + 'a';
        str[i] = c;
    }
    str[n-1] = '\0';
}

void print_string(char *str)
{
    printf("%s\n", str);
}

int main()
{
    char tmp[STRLEN];

    generate_string(tmp, STRLEN);
    print_string(tmp);

    return 0;
}
```
3. compile program
`gcc -o test test.c`

4. get the offset of `print_string()`
```
objdump -t test | grep -w print_string
0000000000401199 g     F .text  000000000000001b              print_string
```

5. configure uprobe with offset 0x1199
```
off=0x1199

cd /sys/kernel/debug/tracing/
echo "p /root/test:${off} arg1=+0(%di):ustring arg2=\$comm arg3=+0(%di):ustring"
 &gt; uprobe_events
echo 1 &gt; events/uprobes/enable
echo 1 &gt; tracing_on
```

6. run `test`, and kasan will report error.
==================================================================
BUG: KASAN: use-after-free in strncpy_from_user+0x1d6/0x1f0
Write of size 8 at addr ffff88812311c004 by task test/499CPU: 0 UID: 0 PID: 499 Comm: test Not tainted 6.12.0-rc3+ #18
Hardware name: Red Hat KVM, BIOS 1.16.0-4.al8 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x55/0x70
 print_address_description.constprop.0+0x27/0x310
 kasan_report+0x10f/0x120
 ? strncpy_from_user+0x1d6/0x1f0
 strncpy_from_user+0x1d6/0x1f0
 ? rmqueue.constprop.0+0x70d/0x2ad0
 process_fetch_insn+0xb26/0x1470
 ? __pfx_process_fetch_insn+0x10/0x10
 ? _raw_spin_lock+0x85/0xe0
 ? __pfx__raw_spin_lock+0x10/0x10
 ? __pte_offset_map+0x1f/0x2d0
 ? unwind_next_frame+0xc5f/0x1f80
 ? arch_stack_walk+0x68/0xf0
 ? is_bpf_text_address+0x23/0x30
 ? kernel_text_address.part.0+0xbb/0xd0
 ? __kernel_text_address+0x66/0xb0
 ? unwind_get_return_address+0x5e/0xa0
 ? __pfx_stack_trace_consume_entry+0x10/0x10
 ? arch_stack_walk+0xa2/0xf0
 ? _raw_spin_lock_irqsave+0x8b/0xf0
 ? __pfx__raw_spin_lock_irqsave+0x10/0x10
 ? depot_alloc_stack+0x4c/0x1f0
 ? _raw_spin_unlock_irqrestore+0xe/0x30
 ? stack_depot_save_flags+0x35d/0x4f0
 ? kasan_save_stack+0x34/0x50
 ? kasan_save_stack+0x24/0x50
 ? mutex_lock+0x91/0xe0
 ? __pfx_mutex_lock+0x10/0x10
 prepare_uprobe_buffer.part.0+0x2cd/0x500
 uprobe_dispatcher+0x2c3/0x6a0
 ? __pfx_uprobe_dispatcher+0x10/0x10
 ? __kasan_slab_alloc+0x4d/0x90
 handler_chain+0xdd/0x3e0
 handle_swbp+0x26e/0x3d0
 ? __pfx_handle_swbp+0x10/0x10
 ? uprobe_pre_sstep_notifier+0x151/0x1b0
 irqentry_exit_to_user_mode+0xe2/0x1b0
 asm_exc_int3+0x39/0x40
RIP: 0033:0x401199
Code: 01 c2 0f b6 45 fb 88 02 83 45 fc 01 8b 45 fc 3b 45 e4 7c b7 8b 45 e4 48 98 48 8d 50 ff 48 8b 45 e8 48 01 d0 ce
RSP: 002b:00007ffdf00576a8 EFLAGS: 00000206
RAX: 00007ffdf00576b0 RBX: 0000000000000000 RCX: 0000000000000ff2
RDX: 0000000000000ffc RSI: 0000000000000ffd RDI: 00007ffdf00576b0
RBP: 00007ffdf00586b0 R08: 00007feb2f9c0d20 R09: 00007feb2f9c0d20
R10: 0000000000000001 R11: 0000000000000202 R12: 0000000000401040
R13: 00007ffdf0058780 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

This commit enforces the buffer's maxlen less than a page-size to avoid
store_trace_args() out-of-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232416">SUSE bug 1232416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50073</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: Fix use-after-free in gsm_cleanup_mux

BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0
drivers/tty/n_gsm.c:3160 [n_gsm]
Read of size 8 at addr ffff88815fe99c00 by task poc/3379
CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56
Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 11/12/2020
Call Trace:
 &lt;TASK&gt;
 gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]
 __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389
 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500
 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846
 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107
 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]
 ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195
 ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79
 __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338
 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

Allocated by task 65:
 gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]
 gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]
 gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]
 gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]
 tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391
 tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39
 flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445
 process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229
 worker_thread+0x3dc/0x950 kernel/workqueue.c:3391
 kthread+0x2a3/0x370 kernel/kthread.c:389
 ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257

Freed by task 3367:
 kfree+0x126/0x420 mm/slub.c:4580
 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

[Analysis]
gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux
can be freed by multi threads through ioctl,which leads
to the occurrence of uaf. Protect it by gsm tx lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232520">SUSE bug 1232520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50074</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parport: Proper fix for array out-of-bounds access

The recent fix for array out-of-bounds accesses replaced sprintf()
calls blindly with snprintf().  However, since snprintf() returns the
would-be-printed size, not the actually output size, the length
calculation can still go over the given limit.

Use scnprintf() instead of snprintf(), which returns the actually
output letters, for addressing the potential out-of-bounds access
properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232507">SUSE bug 1232507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50077</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix multiple init when debugfs is disabled

If bt_debugfs is not created successfully, which happens if either
CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init()
returns early and does not set iso_inited to true. This means that a
subsequent call to iso_init() will result in duplicate calls to
proto_register(), bt_sock_register(), etc.

With CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the
duplicate call to proto_register() triggers this BUG():

  list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250,
    next=ffffffffc0b280d0.
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:35!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x9a/0xa0
  ...
    __list_add_valid_or_report+0x9a/0xa0
    proto_register+0x2b5/0x340
    iso_init+0x23/0x150 [bluetooth]
    set_iso_socket_func+0x68/0x1b0 [bluetooth]
    kmem_cache_free+0x308/0x330
    hci_sock_sendmsg+0x990/0x9e0 [bluetooth]
    __sock_sendmsg+0x7b/0x80
    sock_write_iter+0x9a/0x110
    do_iter_readv_writev+0x11d/0x220
    vfs_writev+0x180/0x3e0
    do_writev+0xca/0x100
  ...

This change removes the early return. The check for iso_debugfs being
NULL was unnecessary, it is always NULL when iso_inited is false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50078</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Call iso_exit() on module unload

If iso_init() has been called, iso_exit() must be called on module
unload. Without that, the struct proto that iso_init() registered with
proto_register() becomes invalid, which could cause unpredictable
problems later. In my case, with CONFIG_LIST_HARDENED and
CONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually
triggers this BUG():

  list_add corruption. next-&gt;prev should be prev (ffffffffb5355fd0),
    but was 0000000000000068. (next=ffffffffc0a010d0).
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:29!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x61/0xa0
  ...
    __list_add_valid_or_report+0x61/0xa0
    proto_register+0x299/0x320
    hci_sock_init+0x16/0xc0 [bluetooth]
    bt_init+0x68/0xd0 [bluetooth]
    __pfx_bt_init+0x10/0x10 [bluetooth]
    do_one_initcall+0x80/0x2f0
    do_init_module+0x8b/0x230
    __do_sys_init_module+0x15f/0x190
    do_syscall_64+0x68/0x110
  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232503">SUSE bug 1232503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50081</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: setup queue -&gt;tag_set before initializing hctx

Commit 7b815817aa58 ("blk-mq: add helper for checking if one CPU is mapped to specified hctx")
needs to check queue mapping via tag set in hctx's cpuhp handler.

However, q-&gt;tag_set may not be setup yet when the cpuhp handler is
enabled, then kernel oops is triggered.

Fix the issue by setup queue tag_set before initializing hctx.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232501">SUSE bug 1232501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50082</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race

We're seeing crashes from rq_qos_wake_function that look like this:

  BUG: unable to handle page fault for address: ffffafe180a40084
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0
  Oops: Oops: 0002 [#1] PREEMPT SMP PTI
  CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40
  Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 &lt;f0&gt; 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00
  RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011
  RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084
  RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011
  R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002
  R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003
  FS:  0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   try_to_wake_up+0x5a/0x6a0
   rq_qos_wake_function+0x71/0x80
   __wake_up_common+0x75/0xa0
   __wake_up+0x36/0x60
   scale_up.part.0+0x50/0x110
   wb_timer_fn+0x227/0x450
   ...

So rq_qos_wake_function() calls wake_up_process(data-&gt;task), which calls
try_to_wake_up(), which faults in raw_spin_lock_irqsave(&amp;p-&gt;pi_lock).

p comes from data-&gt;task, and data comes from the waitqueue entry, which
is stored on the waiter's stack in rq_qos_wait(). Analyzing the core
dump with drgn, I found that the waiter had already woken up and moved
on to a completely unrelated code path, clobbering what was previously
data-&gt;task. Meanwhile, the waker was passing the clobbered garbage in
data-&gt;task to wake_up_process(), leading to the crash.

What's happening is that in between rq_qos_wake_function() deleting the
waitqueue entry and calling wake_up_process(), rq_qos_wait() is finding
that it already got a token and returning. The race looks like this:

rq_qos_wait()                           rq_qos_wake_function()
==============================================================
prepare_to_wait_exclusive()
                                        data-&gt;got_token = true;
                                        list_del_init(&amp;curr-&gt;entry);
if (data.got_token)
        break;
finish_wait(&amp;rqw-&gt;wait, &amp;data.wq);
  ^- returns immediately because
     list_empty_careful(&amp;wq_entry-&gt;entry)
     is true
... return, go do something else ...
                                        wake_up_process(data-&gt;task)
                                          (NO LONGER VALID!)-^

Normally, finish_wait() is supposed to synchronize against the waker.
But, as noted above, it is returning immediately because the waitqueue
entry has already been removed from the waitqueue.

The bug is that rq_qos_wake_function() is accessing the waitqueue entry
AFTER deleting it. Note that autoremove_wake_function() wakes the waiter
and THEN deletes the waitqueue entry, which is the proper order.

Fix it by swapping the order. We also need to use
list_del_init_careful() to match the list_empty_careful() in
finish_wait().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232500">SUSE bug 1232500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50089</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233250">SUSE bug 1233250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50093</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: int340x: processor: Fix warning during module unload

The processor_thermal driver uses pcim_device_enable() to enable a PCI
device, which means the device will be automatically disabled on driver
detach.  Thus there is no need to call pci_disable_device() again on it.

With recent PCI device resource management improvements, e.g. commit
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is
exposed and triggers the warining below.

 [  224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device
 [  224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100
 ...
 [  224.010844] Call Trace:
 [  224.010845]  &lt;TASK&gt;
 [  224.010847]  ? show_regs+0x6d/0x80
 [  224.010851]  ? __warn+0x8c/0x140
 [  224.010854]  ? pci_disable_device+0xe5/0x100
 [  224.010856]  ? report_bug+0x1c9/0x1e0
 [  224.010859]  ? handle_bug+0x46/0x80
 [  224.010862]  ? exc_invalid_op+0x1d/0x80
 [  224.010863]  ? asm_exc_invalid_op+0x1f/0x30
 [  224.010867]  ? pci_disable_device+0xe5/0x100
 [  224.010869]  ? pci_disable_device+0xe5/0x100
 [  224.010871]  ? kfree+0x21a/0x2b0
 [  224.010873]  pcim_disable_device+0x20/0x30
 [  224.010875]  devm_action_release+0x16/0x20
 [  224.010878]  release_nodes+0x47/0xc0
 [  224.010880]  devres_release_all+0x9f/0xe0
 [  224.010883]  device_unbind_cleanup+0x12/0x80
 [  224.010885]  device_release_driver_internal+0x1ca/0x210
 [  224.010887]  driver_detach+0x4e/0xa0
 [  224.010889]  bus_remove_driver+0x6f/0xf0
 [  224.010890]  driver_unregister+0x35/0x60
 [  224.010892]  pci_unregister_driver+0x44/0x90
 [  224.010894]  proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]
 ...
 [  224.010921] ---[ end trace 0000000000000000 ]---

Remove the excess pci_disable_device() calls.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232877">SUSE bug 1232877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50095</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50095" ref_url="https://www.suse.com/security/cve/CVE-2024-50095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mad: Improve handling of timed out WRs of mad agent

Current timeout handler of mad agent acquires/releases mad_agent_priv
lock for every timed out WRs. This causes heavy locking contention
when higher no. of WRs are to be handled inside timeout handler.

This leads to softlockup with below trace in some use cases where
rdma-cm path is used to establish connection between peer nodes

Trace:
-----
 BUG: soft lockup - CPU#4 stuck for 26s! [kworker/u128:3:19767]
 CPU: 4 PID: 19767 Comm: kworker/u128:3 Kdump: loaded Tainted: G OE
     -------  ---  5.14.0-427.13.1.el9_4.x86_64 #1
 Hardware name: Dell Inc. PowerEdge R740/01YM03, BIOS 2.4.8 11/26/2019
 Workqueue: ib_mad1 timeout_sends [ib_core]
 RIP: 0010:__do_softirq+0x78/0x2ac
 RSP: 0018:ffffb253449e4f98 EFLAGS: 00000246
 RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 000000000000001f
 RDX: 000000000000001d RSI: 000000003d1879ab RDI: fff363b66fd3a86b
 RBP: ffffb253604cbcd8 R08: 0000009065635f3b R09: 0000000000000000
 R10: 0000000000000040 R11: ffffb253449e4ff8 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff8caa1fc80000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fd9ec9db900 CR3: 0000000891934006 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? show_trace_log_lvl+0x1c4/0x2df
  ? show_trace_log_lvl+0x1c4/0x2df
  ? __irq_exit_rcu+0xa1/0xc0
  ? watchdog_timer_fn+0x1b2/0x210
  ? __pfx_watchdog_timer_fn+0x10/0x10
  ? __hrtimer_run_queues+0x127/0x2c0
  ? hrtimer_interrupt+0xfc/0x210
  ? __sysvec_apic_timer_interrupt+0x5c/0x110
  ? sysvec_apic_timer_interrupt+0x37/0x90
  ? asm_sysvec_apic_timer_interrupt+0x16/0x20
  ? __do_softirq+0x78/0x2ac
  ? __do_softirq+0x60/0x2ac
  __irq_exit_rcu+0xa1/0xc0
  sysvec_call_function_single+0x72/0x90
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_sysvec_call_function_single+0x16/0x20
 RIP: 0010:_raw_spin_unlock_irq+0x14/0x30
 RSP: 0018:ffffb253604cbd88 EFLAGS: 00000247
 RAX: 000000000001960d RBX: 0000000000000002 RCX: ffff8cad2a064800
 RDX: 000000008020001b RSI: 0000000000000001 RDI: ffff8cad5d39f66c
 RBP: ffff8cad5d39f600 R08: 0000000000000001 R09: 0000000000000000
 R10: ffff8caa443e0c00 R11: ffffb253604cbcd8 R12: ffff8cacb8682538
 R13: 0000000000000005 R14: ffffb253604cbd90 R15: ffff8cad5d39f66c
  cm_process_send_error+0x122/0x1d0 [ib_cm]
  timeout_sends+0x1dd/0x270 [ib_core]
  process_one_work+0x1e2/0x3b0
  ? __pfx_worker_thread+0x10/0x10
  worker_thread+0x50/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xdd/0x100
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x29/0x50
  &lt;/TASK&gt;

Simplified timeout handler by creating local list of timed out WRs
and invoke send handler post creating the list. The new method acquires/
releases lock once to fetch the list and hence helps to reduce locking
contetiong when processing higher no. of WRs
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50095/">CVE-2024-50095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232873">SUSE bug 1232873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50096</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error

The `nouveau_dmem_copy_one` function ensures that the copy push command is
sent to the device firmware but does not track whether it was executed
successfully.

In the case of a copy error (e.g., firmware or hardware failure), the
copy push command will be sent via the firmware channel, and
`nouveau_dmem_copy_one` will likely report success, leading to the
`migrate_to_ram` function returning a dirty HIGH_USER page to the user.

This can result in a security vulnerability, as a HIGH_USER page that may
contain sensitive or corrupted data could be returned to the user.

To prevent this vulnerability, we allocate a zero page. Thus, in case of
an error, a non-dirty (zero) page will be returned to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232870">SUSE bug 1232870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50098</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down

There is a history of deadlock if reboot is performed at the beginning
of booting. SDEV_QUIESCE was set for all LU's scsi_devices by UFS
shutdown, and at that time the audio driver was waiting on
blk_mq_submit_bio() holding a mutex_lock while reading the fw binary.
After that, a deadlock issue occurred while audio driver shutdown was
waiting for mutex_unlock of blk_mq_submit_bio(). To solve this, set
SDEV_OFFLINE for all LUs except WLUN, so that any I/O that comes down
after a UFS shutdown will return an error.

[   31.907781]I[0:      swapper/0:    0]        1        130705007       1651079834      11289729804                0 D(   2) 3 ffffff882e208000 *             init [device_shutdown]
[   31.907793]I[0:      swapper/0:    0] Mutex: 0xffffff8849a2b8b0: owner[0xffffff882e28cb00 kworker/6:0 :49]
[   31.907806]I[0:      swapper/0:    0] Call trace:
[   31.907810]I[0:      swapper/0:    0]  __switch_to+0x174/0x338
[   31.907819]I[0:      swapper/0:    0]  __schedule+0x5ec/0x9cc
[   31.907826]I[0:      swapper/0:    0]  schedule+0x7c/0xe8
[   31.907834]I[0:      swapper/0:    0]  schedule_preempt_disabled+0x24/0x40
[   31.907842]I[0:      swapper/0:    0]  __mutex_lock+0x408/0xdac
[   31.907849]I[0:      swapper/0:    0]  __mutex_lock_slowpath+0x14/0x24
[   31.907858]I[0:      swapper/0:    0]  mutex_lock+0x40/0xec
[   31.907866]I[0:      swapper/0:    0]  device_shutdown+0x108/0x280
[   31.907875]I[0:      swapper/0:    0]  kernel_restart+0x4c/0x11c
[   31.907883]I[0:      swapper/0:    0]  __arm64_sys_reboot+0x15c/0x280
[   31.907890]I[0:      swapper/0:    0]  invoke_syscall+0x70/0x158
[   31.907899]I[0:      swapper/0:    0]  el0_svc_common+0xb4/0xf4
[   31.907909]I[0:      swapper/0:    0]  do_el0_svc+0x2c/0xb0
[   31.907918]I[0:      swapper/0:    0]  el0_svc+0x34/0xe0
[   31.907928]I[0:      swapper/0:    0]  el0t_64_sync_handler+0x68/0xb4
[   31.907937]I[0:      swapper/0:    0]  el0t_64_sync+0x1a0/0x1a4

[   31.908774]I[0:      swapper/0:    0]       49                0         11960702      11236868007                0 D(   2) 6 ffffff882e28cb00 *      kworker/6:0 [__bio_queue_enter]
[   31.908783]I[0:      swapper/0:    0] Call trace:
[   31.908788]I[0:      swapper/0:    0]  __switch_to+0x174/0x338
[   31.908796]I[0:      swapper/0:    0]  __schedule+0x5ec/0x9cc
[   31.908803]I[0:      swapper/0:    0]  schedule+0x7c/0xe8
[   31.908811]I[0:      swapper/0:    0]  __bio_queue_enter+0xb8/0x178
[   31.908818]I[0:      swapper/0:    0]  blk_mq_submit_bio+0x194/0x67c
[   31.908827]I[0:      swapper/0:    0]  __submit_bio+0xb8/0x19c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232881">SUSE bug 1232881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50099</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50099" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Remove broken LDR (literal) uprobe support

The simulate_ldr_literal() and simulate_ldrsw_literal() functions are
unsafe to use for uprobes. Both functions were originally written for
use with kprobes, and access memory with plain C accesses. When uprobes
was added, these were reused unmodified even though they cannot safely
access user memory.

There are three key problems:

1) The plain C accesses do not have corresponding extable entries, and
   thus if they encounter a fault the kernel will treat these as
   unintentional accesses to user memory, resulting in a BUG() which
   will kill the kernel thread, and likely lead to further issues (e.g.
   lockup or panic()).

2) The plain C accesses are subject to HW PAN and SW PAN, and so when
   either is in use, any attempt to simulate an access to user memory
   will fault. Thus neither simulate_ldr_literal() nor
   simulate_ldrsw_literal() can do anything useful when simulating a
   user instruction on any system with HW PAN or SW PAN.

3) The plain C accesses are privileged, as they run in kernel context,
   and in practice can access a small range of kernel virtual addresses.
   The instructions they simulate have a range of +/-1MiB, and since the
   simulated instructions must itself be a user instructions in the
   TTBR0 address range, these can address the final 1MiB of the TTBR1
   acddress range by wrapping downwards from an address in the first
   1MiB of the TTBR0 address range.

   In contemporary kernels the last 8MiB of TTBR1 address range is
   reserved, and accesses to this will always fault, meaning this is no
   worse than (1).

   Historically, it was theoretically possible for the linear map or
   vmemmap to spill into the final 8MiB of the TTBR1 address range, but
   in practice this is extremely unlikely to occur as this would
   require either:

   * Having enough physical memory to fill the entire linear map all the
     way to the final 1MiB of the TTBR1 address range.

   * Getting unlucky with KASLR randomization of the linear map such
     that the populated region happens to overlap with the last 1MiB of
     the TTBR address range.

   ... and in either case if we were to spill into the final page there
   would be larger problems as the final page would alias with error
   pointers.

Practically speaking, (1) and (2) are the big issues. Given there have
been no reports of problems since the broken code was introduced, it
appears that no-one is relying on probing these instructions with
uprobes.

Avoid these issues by not allowing uprobes on LDR (literal) and LDRSW
(literal), limiting the use of simulate_ldr_literal() and
simulate_ldrsw_literal() to kprobes. Attempts to place uprobes on LDR
(literal) and LDRSW (literal) will be rejected as
arm_probe_decode_insn() will return INSN_REJECTED. In future we can
consider introducing working uprobes support for these instructions, but
this will require more significant work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232887">SUSE bug 1232887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50103</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50103" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()

A devm_kzalloc() in asoc_qcom_lpass_cpu_platform_probe() could
possibly return NULL pointer. NULL Pointer Dereference may be
triggerred without addtional check.
Add a NULL check for the returned pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232878">SUSE bug 1232878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50108</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50108" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too

Stuart Hayhurst has found that both at bootup and fullscreen VA-API video
is leading to black screens for around 1 second and kernel WARNING [1] traces
when calling dmub_psr_enable() with Parade 08-01 TCON.

These symptoms all go away with PSR-SU disabled for this TCON, so disable
it for now while DMUB traces [2] from the failure can be analyzed and the failure
state properly root caused.

(cherry picked from commit afb634a6823d8d9db23c5fb04f79c5549349628b)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232884">SUSE bug 1232884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50110</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: fix one more kernel-infoleak in algo dumping

During fuzz testing, the following issue was discovered:

BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x598/0x2a30
 _copy_to_iter+0x598/0x2a30
 __skb_datagram_iter+0x168/0x1060
 skb_copy_datagram_iter+0x5b/0x220
 netlink_recvmsg+0x362/0x1700
 sock_recvmsg+0x2dc/0x390
 __sys_recvfrom+0x381/0x6d0
 __x64_sys_recvfrom+0x130/0x200
 x64_sys_call+0x32c8/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Uninit was stored to memory at:
 copy_to_user_state_extra+0xcc1/0x1e00
 dump_one_state+0x28c/0x5f0
 xfrm_state_walk+0x548/0x11e0
 xfrm_dump_sa+0x1e0/0x840
 netlink_dump+0x943/0x1c40
 __netlink_dump_start+0x746/0xdb0
 xfrm_user_rcv_msg+0x429/0xc00
 netlink_rcv_skb+0x613/0x780
 xfrm_netlink_rcv+0x77/0xc0
 netlink_unicast+0xe90/0x1280
 netlink_sendmsg+0x126d/0x1490
 __sock_sendmsg+0x332/0x3d0
 ____sys_sendmsg+0x863/0xc30
 ___sys_sendmsg+0x285/0x3e0
 __x64_sys_sendmsg+0x2d6/0x560
 x64_sys_call+0x1316/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Uninit was created at:
 __kmalloc+0x571/0xd30
 attach_auth+0x106/0x3e0
 xfrm_add_sa+0x2aa0/0x4230
 xfrm_user_rcv_msg+0x832/0xc00
 netlink_rcv_skb+0x613/0x780
 xfrm_netlink_rcv+0x77/0xc0
 netlink_unicast+0xe90/0x1280
 netlink_sendmsg+0x126d/0x1490
 __sock_sendmsg+0x332/0x3d0
 ____sys_sendmsg+0x863/0xc30
 ___sys_sendmsg+0x285/0x3e0
 __x64_sys_sendmsg+0x2d6/0x560
 x64_sys_call+0x1316/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Bytes 328-379 of 732 are uninitialized
Memory access of size 732 starts at ffff88800e18e000
Data copied to user address 00007ff30f48aff0

CPU: 2 PID: 18167 Comm: syz-executor.0 Not tainted 6.8.11 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014

Fixes copying of xfrm algorithms where some random
data of the structure fields can end up in userspace.
Padding in structures may be filled with random (possibly sensitve)
data and should never be given directly to user-space.

A similar issue was resolved in the commit
8222d5910dae ("xfrm: Zero padding when dumping algos and encap")

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232885">SUSE bug 1232885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50115</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50115" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory

Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits
4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't
enforce 32-byte alignment of nCR3.

In the absolute worst case scenario, failure to ignore bits 4:0 can result
in an out-of-bounds read, e.g. if the target page is at the end of a
memslot, and the VMM isn't using guard pages.

Per the APM:

  The CR3 register points to the base address of the page-directory-pointer
  table. The page-directory-pointer table is aligned on a 32-byte boundary,
  with the low 5 address bits 4:0 assumed to be 0.

And the SDM's much more explicit:

  4:0    Ignored

Note, KVM gets this right when loading PDPTRs, it's only the nSVM flow
that is broken.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233019">SUSE bug 1233019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50116</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50116" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug due to missing clearing of buffer delay flag

Syzbot reported that after nilfs2 reads a corrupted file system image
and degrades to read-only, the BUG_ON check for the buffer delay flag
in submit_bh_wbc() may fail, causing a kernel bug.

This is because the buffer delay flag is not cleared when clearing the
buffer state flags to discard a page/folio or a buffer head. So, fix
this.

This became necessary when the use of nilfs2's own page clear routine
was expanded.  This state inconsistency does not occur if the buffer
is written normally by log writing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232892">SUSE bug 1232892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50117</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50117" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Guard against bad data for ATIF ACPI method

If a BIOS provides bad data in response to an ATIF method call
this causes a NULL pointer dereference in the caller.

```
? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434)
? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2))
? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1))
? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642)
? exc_page_fault (arch/x86/mm/fault.c:1542)
? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu
```

It has been encountered on at least one system, so guard for it.

(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232897">SUSE bug 1232897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50124</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50124" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix UAF on iso_sock_timeout

conn-&gt;sk maybe have been unlinked/freed while waiting for iso_conn_lock
so this checks if the conn-&gt;sk is still valid by checking if it part of
iso_sk_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232926">SUSE bug 1232926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232927">SUSE bug 1232927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50125</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50125" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix UAF on sco_sock_timeout

conn-&gt;sk maybe have been unlinked/freed while waiting for sco_conn_lock
so this checks if the conn-&gt;sk is still valid by checking if it part of
sco_sk_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232928">SUSE bug 1232928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232929">SUSE bug 1232929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50127</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix use-after-free in taprio_change()

In 'taprio_change()', 'admin' pointer may become dangling due to sched
switch / removal caused by 'advance_sched()', and critical section
protected by 'q-&gt;current_entry_lock' is too small to prevent from such
a scenario (which causes use-after-free detected by KASAN). Fix this
by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update
'admin' immediately before an attempt to schedule freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232908">SUSE bug 1232908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50128</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: fix global oob in wwan_rtnl_policy

The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to
a global out-of-bounds read when parsing the netlink attributes. Exactly
same bug cause as the oob fixed in commit b33fb5b801c6 ("net: qualcomm:
rmnet: fix global oob in rmnet_policy").

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:388 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
Read of size 1 at addr ffffffff8b09cb60 by task syz.1.66276/323862

CPU: 0 PID: 323862 Comm: syz.1.66276 Not tainted 6.1.70 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x14f/0x750 mm/kasan/report.c:395
 kasan_report+0x139/0x170 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:388 [inline]
 __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
 __nla_parse+0x3c/0x50 lib/nlattr.c:700
 nla_parse_nested_deprecated include/net/netlink.h:1269 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3514 [inline]
 rtnl_newlink+0x7bc/0x1fd0 net/core/rtnetlink.c:3623
 rtnetlink_rcv_msg+0x794/0xef0 net/core/rtnetlink.c:6122
 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508
 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
 netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352
 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874
 sock_sendmsg_nosec net/socket.c:716 [inline]
 __sock_sendmsg net/socket.c:728 [inline]
 ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499
 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553
 __sys_sendmsg net/socket.c:2582 [inline]
 __do_sys_sendmsg net/socket.c:2591 [inline]
 __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f67b19a24ad
RSP: 002b:00007f67b17febb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f67b1b45f80 RCX: 00007f67b19a24ad
RDX: 0000000000000000 RSI: 0000000020005e40 RDI: 0000000000000004
RBP: 00007f67b1a1e01d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd2513764f R14: 00007ffd251376e0 R15: 00007f67b17fed40
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 wwan_rtnl_policy+0x20/0x40

The buggy address belongs to the physical page:
page:ffffea00002c2700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb09c
flags: 0xfff00000001000(reserved|node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000001000 ffffea00002c2708 ffffea00002c2708 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner info is not present (never set?)

Memory state around the buggy address:
 ffffffff8b09ca00: 05 f9 f9 f9 05 f9 f9 f9 00 01 f9 f9 00 01 f9 f9
 ffffffff8b09ca80: 00 00 00 05 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9
&gt;ffffffff8b09cb00: 00 00 00 00 05 f9 f9 f9 00 00 00 00 f9 f9 f9 f9
                                                       ^
 ffffffff8b09cb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================

According to the comment of `nla_parse_nested_deprecated`, use correct size
`IFLA_WWAN_MAX` here to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50131</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Consider the NULL character when validating the event length

strlen() returns a string length excluding the null byte. If the string
length equals to the maximum buffer length, the buffer will have no
space for the NULL terminating character.

This commit checks this condition and returns failure for it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232896">SUSE bug 1232896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50134</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50134" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA

Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with
a real VLA to fix a "memcpy: detected field-spanning write error" warning:

[   13.319813] memcpy: detected field-spanning write (size 16896) of single field "p-&gt;data" at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 (size 4)
[   13.319841] WARNING: CPU: 0 PID: 1105 at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 hgsmi_update_pointer_shape+0x192/0x1c0 [vboxvideo]
[   13.320038] Call Trace:
[   13.320173]  hgsmi_update_pointer_shape [vboxvideo]
[   13.320184]  vbox_cursor_atomic_update [vboxvideo]

Note as mentioned in the added comment it seems the original length
calculation for the allocated and send hgsmi buffer is 4 bytes too large.
Changing this is not the goal of this patch, so this behavior is kept.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232890">SUSE bug 1232890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50135</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50135" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50135" ref_url="https://www.suse.com/security/cve/CVE-2024-50135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix race condition between reset and nvme_dev_disable()

nvme_dev_disable() modifies the dev-&gt;online_queues field, therefore
nvme_pci_update_nr_queues() should avoid racing against it, otherwise
we could end up passing invalid values to blk_mq_update_nr_hw_queues().

 WARNING: CPU: 39 PID: 61303 at drivers/pci/msi/api.c:347
          pci_irq_get_affinity+0x187/0x210
 Workqueue: nvme-reset-wq nvme_reset_work [nvme]
 RIP: 0010:pci_irq_get_affinity+0x187/0x210
 Call Trace:
  &lt;TASK&gt;
  ? blk_mq_pci_map_queues+0x87/0x3c0
  ? pci_irq_get_affinity+0x187/0x210
  blk_mq_pci_map_queues+0x87/0x3c0
  nvme_pci_map_queues+0x189/0x460 [nvme]
  blk_mq_update_nr_hw_queues+0x2a/0x40
  nvme_reset_work+0x1be/0x2a0 [nvme]

Fix the bug by locking the shutdown_lock mutex before using
dev-&gt;online_queues. Give up if nvme_dev_disable() is running or if
it has been executed already.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50135/">CVE-2024-50135 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232888">SUSE bug 1232888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50138</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50138" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Use raw_spinlock_t in ringbuf

The function __bpf_ringbuf_reserve is invoked from a tracepoint, which
disables preemption. Using spinlock_t in this context can lead to a
"sleep in atomic" warning in the RT variant. This issue is illustrated
in the example below:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs
preempt_count: 1, expected: 0
RCU nest depth: 1, expected: 1
INFO: lockdep is turned off.
Preemption disabled at:
[&lt;ffffd33a5c88ea44&gt;] migrate_enable+0xc0/0x39c
CPU: 7 PID: 556208 Comm: test_progs Tainted: G
Hardware name: Qualcomm SA8775P Ride (DT)
Call trace:
 dump_backtrace+0xac/0x130
 show_stack+0x1c/0x30
 dump_stack_lvl+0xac/0xe8
 dump_stack+0x18/0x30
 __might_resched+0x3bc/0x4fc
 rt_spin_lock+0x8c/0x1a4
 __bpf_ringbuf_reserve+0xc4/0x254
 bpf_ringbuf_reserve_dynptr+0x5c/0xdc
 bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238
 trace_call_bpf+0x238/0x774
 perf_call_bpf_enter.isra.0+0x104/0x194
 perf_syscall_enter+0x2f8/0x510
 trace_sys_enter+0x39c/0x564
 syscall_trace_enter+0x220/0x3c0
 do_el0_svc+0x138/0x1dc
 el0_svc+0x54/0x130
 el0t_64_sync_handler+0x134/0x150
 el0t_64_sync+0x17c/0x180

Switch the spinlock to raw_spinlock_t to avoid this error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232935">SUSE bug 1232935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50141</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context

PRMT needs to find the correct type of block to translate the PA-VA
mapping for EFI runtime services.

The issue arises because the PRMT is finding a block of type
EFI_CONVENTIONAL_MEMORY, which is not appropriate for runtime services
as described in Section 2.2.2 (Runtime Services) of the UEFI
Specification [1]. Since the PRM handler is a type of runtime service,
this causes an exception when the PRM handler is called.

    [Firmware Bug]: Unable to handle paging request in EFI runtime service
    WARNING: CPU: 22 PID: 4330 at drivers/firmware/efi/runtime-wrappers.c:341
        __efi_queue_work+0x11c/0x170
    Call trace:

Let PRMT find a block with EFI_MEMORY_RUNTIME for PRM handler and PRM
context.

If no suitable block is found, a warning message will be printed, but
the procedure continues to manage the next PRM handler.

However, if the PRM handler is actually called without proper allocation,
it would result in a failure during error handling.

By using the correct memory types for runtime services, ensure that the
PRM handler and the context are properly mapped in the virtual address
space during runtime, preventing the paging request error.

The issue is really that only memory that has been remapped for runtime
by the firmware can be used by the PRM handler, and so the region needs
to have the EFI_MEMORY_RUNTIME attribute.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233065">SUSE bug 1233065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50146</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't call cleanup on profile rollback failure

When profile rollback fails in mlx5e_netdev_change_profile, the netdev
profile var is left set to NULL. Avoid a crash when unloading the driver
by not calling profile-&gt;cleanup in such a case.

This was encountered while testing, with the original trigger that
the wq rescuer thread creation got interrupted (presumably due to
Ctrl+C-ing modprobe), which gets converted to ENOMEM (-12) by
mlx5e_priv_init, the profile rollback also fails for the same reason
(signal still active) so the profile is left as NULL, leading to a crash
later in _mlx5e_remove.

 [  732.473932] mlx5_core 0000:08:00.1: E-Switch: Unload vfs: mode(OFFLOADS), nvfs(2), necvfs(0), active vports(2)
 [  734.525513] workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
 [  734.557372] mlx5_core 0000:08:00.1: mlx5e_netdev_init_profile:6235:(pid 6086): mlx5e_priv_init failed, err=-12
 [  734.559187] mlx5_core 0000:08:00.1 eth3: mlx5e_netdev_change_profile: new profile init failed, -12
 [  734.560153] workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
 [  734.589378] mlx5_core 0000:08:00.1: mlx5e_netdev_init_profile:6235:(pid 6086): mlx5e_priv_init failed, err=-12
 [  734.591136] mlx5_core 0000:08:00.1 eth3: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12
 [  745.537492] BUG: kernel NULL pointer dereference, address: 0000000000000008
 [  745.538222] #PF: supervisor read access in kernel mode
&lt;snipped&gt;
 [  745.551290] Call Trace:
 [  745.551590]  &lt;TASK&gt;
 [  745.551866]  ? __die+0x20/0x60
 [  745.552218]  ? page_fault_oops+0x150/0x400
 [  745.555307]  ? exc_page_fault+0x79/0x240
 [  745.555729]  ? asm_exc_page_fault+0x22/0x30
 [  745.556166]  ? mlx5e_remove+0x6b/0xb0 [mlx5_core]
 [  745.556698]  auxiliary_bus_remove+0x18/0x30
 [  745.557134]  device_release_driver_internal+0x1df/0x240
 [  745.557654]  bus_remove_device+0xd7/0x140
 [  745.558075]  device_del+0x15b/0x3c0
 [  745.558456]  mlx5_rescan_drivers_locked.part.0+0xb1/0x2f0 [mlx5_core]
 [  745.559112]  mlx5_unregister_device+0x34/0x50 [mlx5_core]
 [  745.559686]  mlx5_uninit_one+0x46/0xf0 [mlx5_core]
 [  745.560203]  remove_one+0x4e/0xd0 [mlx5_core]
 [  745.560694]  pci_device_remove+0x39/0xa0
 [  745.561112]  device_release_driver_internal+0x1df/0x240
 [  745.561631]  driver_detach+0x47/0x90
 [  745.562022]  bus_remove_driver+0x84/0x100
 [  745.562444]  pci_unregister_driver+0x3b/0x90
 [  745.562890]  mlx5_cleanup+0xc/0x1b [mlx5_core]
 [  745.563415]  __x64_sys_delete_module+0x14d/0x2f0
 [  745.563886]  ? kmem_cache_free+0x1b0/0x460
 [  745.564313]  ? lockdep_hardirqs_on_prepare+0xe2/0x190
 [  745.564825]  do_syscall_64+0x6d/0x140
 [  745.565223]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 [  745.565725] RIP: 0033:0x7f1579b1288b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233056">SUSE bug 1233056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50147</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix command bitmask initialization

Command bitmask have a dedicated bit for MANAGE_PAGES command, this bit
isn't Initialize during command bitmask Initialization, only during
MANAGE_PAGES.

In addition, mlx5_cmd_trigger_completions() is trying to trigger
completion for MANAGE_PAGES command as well.

Hence, in case health error occurred before any MANAGE_PAGES command
have been invoke (for example, during mlx5_enable_hca()),
mlx5_cmd_trigger_completions() will try to trigger completion for
MANAGE_PAGES command, which will result in null-ptr-deref error.[1]

Fix it by Initialize command bitmask correctly.

While at it, re-write the code for better understanding.

[1]
BUG: KASAN: null-ptr-deref in mlx5_cmd_trigger_completions+0x1db/0x600 [mlx5_core]
Write of size 4 at addr 0000000000000214 by task kworker/u96:2/12078
CPU: 10 PID: 12078 Comm: kworker/u96:2 Not tainted 6.9.0-rc2_for_upstream_debug_2024_04_07_19_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_health0000:08:00.0 mlx5_fw_fatal_reporter_err_work [mlx5_core]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x7e/0xc0
 kasan_report+0xb9/0xf0
 kasan_check_range+0xec/0x190
 mlx5_cmd_trigger_completions+0x1db/0x600 [mlx5_core]
 mlx5_cmd_flush+0x94/0x240 [mlx5_core]
 enter_error_state+0x6c/0xd0 [mlx5_core]
 mlx5_fw_fatal_reporter_err_work+0xf3/0x480 [mlx5_core]
 process_one_work+0x787/0x1490
 ? lockdep_hardirqs_on_prepare+0x400/0x400
 ? pwq_dec_nr_in_flight+0xda0/0xda0
 ? assign_work+0x168/0x240
 worker_thread+0x586/0xd30
 ? rescuer_thread+0xae0/0xae0
 kthread+0x2df/0x3b0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x2d/0x70
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233067">SUSE bug 1233067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50148</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50148" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bnep: fix wild-memory-access in proto_unregister

There's issue as follows:
  KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]
  CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W
  RIP: 0010:proto_unregister+0xee/0x400
  Call Trace:
   &lt;TASK&gt;
   __do_sys_delete_module+0x318/0x580
   do_syscall_64+0xc1/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()
will cleanup all resource. Then when remove bnep module will call
bnep_sock_cleanup() to cleanup sock's resource.
To solve above issue just return bnep_sock_init()'s return value in
bnep_exit().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233063">SUSE bug 1233063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50150</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmode should keep reference to parent

The altmode device release refers to its parent device, but without keeping
a reference to it.

When registering the altmode, get a reference to the parent and put it in
the release function.

Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues
like this:

[   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000)
[   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000)
[   46.612867] ==================================================================
[   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129
[   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48
[   46.614538]
[   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535
[   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   46.616042] Workqueue: events kobject_delayed_cleanup
[   46.616446] Call Trace:
[   46.616648]  &lt;TASK&gt;
[   46.616820]  dump_stack_lvl+0x5b/0x7c
[   46.617112]  ? typec_altmode_release+0x38/0x129
[   46.617470]  print_report+0x14c/0x49e
[   46.617769]  ? rcu_read_unlock_sched+0x56/0x69
[   46.618117]  ? __virt_addr_valid+0x19a/0x1ab
[   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d
[   46.618807]  ? typec_altmode_release+0x38/0x129
[   46.619161]  kasan_report+0x8d/0xb4
[   46.619447]  ? typec_altmode_release+0x38/0x129
[   46.619809]  ? process_scheduled_works+0x3cb/0x85f
[   46.620185]  typec_altmode_release+0x38/0x129
[   46.620537]  ? process_scheduled_works+0x3cb/0x85f
[   46.620907]  device_release+0xaf/0xf2
[   46.621206]  kobject_delayed_cleanup+0x13b/0x17a
[   46.621584]  process_scheduled_works+0x4f6/0x85f
[   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10
[   46.622353]  ? hlock_class+0x31/0x9a
[   46.622647]  ? lock_acquired+0x361/0x3c3
[   46.622956]  ? move_linked_works+0x46/0x7d
[   46.623277]  worker_thread+0x1ce/0x291
[   46.623582]  ? __kthread_parkme+0xc8/0xdf
[   46.623900]  ? __pfx_worker_thread+0x10/0x10
[   46.624236]  kthread+0x17e/0x190
[   46.624501]  ? kthread+0xfb/0x190
[   46.624756]  ? __pfx_kthread+0x10/0x10
[   46.625015]  ret_from_fork+0x20/0x40
[   46.625268]  ? __pfx_kthread+0x10/0x10
[   46.625532]  ret_from_fork_asm+0x1a/0x30
[   46.625805]  &lt;/TASK&gt;
[   46.625953]
[   46.626056] Allocated by task 678:
[   46.626287]  kasan_save_stack+0x24/0x44
[   46.626555]  kasan_save_track+0x14/0x2d
[   46.626811]  __kasan_kmalloc+0x3f/0x4d
[   46.627049]  __kmalloc_noprof+0x1bf/0x1f0
[   46.627362]  typec_register_port+0x23/0x491
[   46.627698]  cros_typec_probe+0x634/0xbb6
[   46.628026]  platform_probe+0x47/0x8c
[   46.628311]  really_probe+0x20a/0x47d
[   46.628605]  device_driver_attach+0x39/0x72
[   46.628940]  bind_store+0x87/0xd7
[   46.629213]  kernfs_fop_write_iter+0x1aa/0x218
[   46.629574]  vfs_write+0x1d6/0x29b
[   46.629856]  ksys_write+0xcd/0x13b
[   46.630128]  do_syscall_64+0xd4/0x139
[   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   46.630820]
[   46.630946] Freed by task 48:
[   46.631182]  kasan_save_stack+0x24/0x44
[   46.631493]  kasan_save_track+0x14/0x2d
[   46.631799]  kasan_save_free_info+0x3f/0x4d
[   46.632144]  __kasan_slab_free+0x37/0x45
[   46.632474]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233051">SUSE bug 1233051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50153</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Fix null-ptr-deref in target_alloc_device()

There is a null-ptr-deref issue reported by KASAN:

BUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]
...
 kasan_report+0xb9/0xf0
 target_alloc_device+0xbc4/0xbe0 [target_core_mod]
 core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]
 target_core_init_configfs+0x205/0x420 [target_core_mod]
 do_one_initcall+0xdd/0x4e0
...
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

In target_alloc_device(), if allocing memory for dev queues fails, then
dev will be freed by dev-&gt;transport-&gt;free_device(), but dev-&gt;transport
is not initialized at that time, which will lead to a null pointer
reference problem.

Fixing this bug by freeing dev with hba-&gt;backend-&gt;ops-&gt;free_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233061">SUSE bug 1233061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50154</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().

  """
  We are seeing a use-after-free from a bpf prog attached to
  trace_tcp_retransmit_synack. The program passes the req-&gt;sk to the
  bpf_sk_storage_get_tracing kernel helper which does check for null
  before using it.
  """

The commit 83fccfc3940c ("inet: fix potential deadlock in
reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not
to call del_timer_sync() from reqsk_timer_handler(), but it introduced a
small race window.

Before the timer is called, expire_timers() calls detach_timer(timer, true)
to clear timer-&gt;entry.pprev and marks it as not pending.

If reqsk_queue_unlink() checks timer_pending() just after expire_timers()
calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will
continue running and send multiple SYN+ACKs until it expires.

The reported UAF could happen if req-&gt;sk is close()d earlier than the timer
expiration, which is 63s by default.

The scenario would be

  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),
     but del_timer_sync() is missed

  2. reqsk timer is executed and scheduled again

  3. req-&gt;sk is accept()ed and reqsk_put() decrements rsk_refcnt, but
     reqsk timer still has another one, and inet_csk_accept() does not
     clear req-&gt;sk for non-TFO sockets

  4. sk is close()d

  5. reqsk timer is executed again, and BPF touches req-&gt;sk

Let's not use timer_pending() by passing the caller context to
__inet_csk_reqsk_queue_drop().

Note that reqsk timer is pinned, so the issue does not happen in most
use cases. [1]

[0]
BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0

Use-after-free read at 0x00000000a891fb3a (in kfence-#1):
bpf_sk_storage_get_tracing+0x2e/0x1b0
bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda
bpf_trace_run2+0x4c/0xc0
tcp_rtx_synack+0xf9/0x100
reqsk_timer_handler+0xda/0x3d0
run_timer_softirq+0x292/0x8a0
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
intel_idle_irq+0x5a/0xa0
cpuidle_enter_state+0x94/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6

allocated by task 0 on cpu 9 at 260507.901592s:
sk_prot_alloc+0x35/0x140
sk_clone_lock+0x1f/0x3f0
inet_csk_clone_lock+0x15/0x160
tcp_create_openreq_child+0x1f/0x410
tcp_v6_syn_recv_sock+0x1da/0x700
tcp_check_req+0x1fb/0x510
tcp_v6_rcv+0x98b/0x1420
ipv6_list_rcv+0x2258/0x26e0
napi_complete_done+0x5b1/0x2990
mlx5e_napi_poll+0x2ae/0x8d0
net_rx_action+0x13e/0x590
irq_exit_rcu+0xf5/0x320
common_interrupt+0x80/0x90
asm_common_interrupt+0x22/0x40
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

freed by task 0 on cpu 9 at 260507.927527s:
rcu_core_si+0x4ff/0xf10
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233072">SUSE bug 1233072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50155</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50155" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: use cond_resched() in nsim_dev_trap_report_work()

I am still seeing many syzbot reports hinting that syzbot
might fool nsim_dev_trap_report_work() with hundreds of ports [1]

Lets use cond_resched(), and system_unbound_wq
instead of implicit system_wq.

[1]
INFO: task syz-executor:20633 blocked for more than 143 seconds.
      Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25856 pid:20633 tgid:20633 ppid:1      flags:0x00004006
...
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events nsim_dev_trap_report_work
 RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 &lt;f3&gt; 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0
RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246
RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00
RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577
R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000
R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
  __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
  spin_unlock_bh include/linux/spinlock.h:396 [inline]
  nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
  nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850
  process_one_work kernel/workqueue.c:3229 [inline]
  process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
  worker_thread+0x870/0xd30 kernel/workqueue.c:3391
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233035">SUSE bug 1233035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50156</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Avoid NULL dereference in msm_disp_state_print_regs()

If the allocation in msm_disp_state_dump_regs() failed then
`block-&gt;state` can be NULL. The msm_disp_state_print_regs() function
_does_ have code to try to handle it with:

  if (*reg)
    dump_addr = *reg;

...but since "dump_addr" is initialized to NULL the above is actually
a noop. The code then goes on to dereference `dump_addr`.

Make the function print "Registers not stored" when it sees a NULL to
solve this. Since we're touching the code, fix
msm_disp_state_print_regs() not to pointlessly take a double-pointer
and properly mark the pointer as `const`.

Patchwork: https://patchwork.freedesktop.org/patch/619657/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233073">SUSE bug 1233073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50160</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50160" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/cs8409: Fix possible NULL dereference

If snd_hda_gen_add_kctl fails to allocate memory and returns NULL, then
NULL pointer dereference will occur in the next line.

Since dolphin_fixups function is a hda_fixup function which is not supposed
to return any errors, add simple check before dereference, ignore the fail.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233074">SUSE bug 1233074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50167</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50167" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

be2net: fix potential memory leak in be_xmit()

The be_xmit() returns NETDEV_TX_OK without freeing skb
in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233049">SUSE bug 1233049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50171</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50171" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: systemport: fix potential memory leak in bcm_sysport_xmit()

The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb
in case of dma_map_single() fails, add dev_kfree_skb() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233057">SUSE bug 1233057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50179</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50179" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: remove the incorrect Fw reference check when dirtying pages

When doing the direct-io reads it will also try to mark pages dirty,
but for the read path it won't hold the Fw caps and there is case
will it get the Fw reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233123">SUSE bug 1233123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50180</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: sisfb: Fix strbuf array overflow

The values of the variables xres and yres are placed in strbuf.
These variables are obtained from strbuf1.
The strbuf1 array contains digit characters
and a space if the array contains non-digit characters.
Then, when executing sprintf(strbuf, "%ux%ux8", xres, yres);
more than 16 bytes will be written to strbuf.
It is suggested to increase the size of the strbuf array to 24.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233125">SUSE bug 1233125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50182</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

secretmem: disable memfd_secret() if arch cannot set direct map

Return -ENOSYS from memfd_secret() syscall if !can_set_direct_map().  This
is the case for example on some arm64 configurations, where marking 4k
PTEs in the direct map not present can only be done if the direct map is
set up at 4k granularity in the first place (as ARM's break-before-make
semantics do not easily allow breaking apart large/gigantic pages).

More precisely, on arm64 systems with !can_set_direct_map(),
set_direct_map_invalid_noflush() is a no-op, however it returns success
(0) instead of an error.  This means that memfd_secret will seemingly
"work" (e.g.  syscall succeeds, you can mmap the fd and fault in pages),
but it does not actually achieve its goal of removing its memory from the
direct map.

Note that with this patch, memfd_secret() will start erroring on systems
where can_set_direct_map() returns false (arm64 with
CONFIG_RODATA_FULL_DEFAULT_ENABLED=n, CONFIG_DEBUG_PAGEALLOC=n and
CONFIG_KFENCE=n), but that still seems better than the current silent
failure.  Since CONFIG_RODATA_FULL_DEFAULT_ENABLED defaults to 'y', most
arm64 systems actually have a working memfd_secret() and aren't be
affected.

From going through the iterations of the original memfd_secret patch
series, it seems that disabling the syscall in these scenarios was the
intended behavior [1] (preferred over having
set_direct_map_invalid_noflush return an error as that would result in
SIGBUSes at page-fault time), however the check for it got dropped between
v16 [2] and v17 [3], when secretmem moved away from CMA allocations.

[1]: https://lore.kernel.org/lkml/20201124164930.GK8537@kernel.org/
[2]: https://lore.kernel.org/lkml/20210121122723.3446-11-rppt@kernel.org/#t
[3]: https://lore.kernel.org/lkml/20201125092208.12544-10-rppt@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233129">SUSE bug 1233129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50183</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50183" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance

Deleting an NPIV instance requires all fabric ndlps to be released before
an NPIV's resources can be torn down.  Failure to release fabric ndlps
beforehand opens kref imbalance race conditions.  Fix by forcing the DA_ID
to complete synchronously with usage of wait_queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233130">SUSE bug 1233130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50184</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50184" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_pmem: Check device status before requesting flush

If a pmem device is in a bad status, the driver side could wait for
host ack forever in virtio_pmem_flush(), causing the system to hang.

So add a status check in the beginning of virtio_pmem_flush() to return
early if the device is not activated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233135">SUSE bug 1233135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50186</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: explicitly clear the sk pointer, when pf-&gt;create fails

We have recently noticed the exact same KASAN splat as in commit
6cd4a78d962b ("net: do not leave a dangling sk pointer, when socket
creation fails"). The problem is that commit did not fully address the
problem, as some pf-&gt;create implementations do not use sk_common_release
in their error paths.

For example, we can use the same reproducer as in the above commit, but
changing ping to arping. arping uses AF_PACKET socket and if packet_create
fails, it will just sk_free the allocated sk object.

While we could chase all the pf-&gt;create implementations and make sure they
NULL the freed sk object on error from the socket, we can't guarantee
future protocols will not make the same mistake.

So it is easier to just explicitly NULL the sk pointer upon return from
pf-&gt;create in __sock_create. We do know that pf-&gt;create always releases the
allocated sk object on error, so if the pointer is not NULL, it is
definitely dangling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233110">SUSE bug 1233110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50187</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50187" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Stop the active perfmon before being destroyed

Upon closing the file descriptor, the active performance monitor is not
stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`,
the active performance monitor's pointer (`vc4-&gt;active_perfmon`) is still
retained.

If we open a new file descriptor and submit a few jobs with performance
monitors, the driver will attempt to stop the active performance monitor
using the stale pointer in `vc4-&gt;active_perfmon`. However, this pointer
is no longer valid because the previous process has already terminated,
and all performance monitors associated with it have been destroyed and
freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233108">SUSE bug 1233108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50188</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50188" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: dp83869: fix memory corruption when enabling fiber

When configuring the fiber port, the DP83869 PHY driver incorrectly
calls linkmode_set_bit() with a bit mask (1 &lt;&lt; 10) rather than a bit
number (10). This corrupts some other memory location -- in case of
arm64 the priv pointer in the same structure.

Since the advertising flags are updated from supported at the end of the
function the incorrect line isn't needed at all and can be removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233107">SUSE bug 1233107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50189</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()

Using the device-managed version allows to simplify clean-up in probe()
error path.

Additionally, this device-managed ensures proper cleanup, which helps to
resolve memory errors, page faults, btrfs going read-only, and btrfs
disk corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233105">SUSE bug 1233105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50192</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50192" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v4: Don't allow a VMOVP on a dying VPE

Kunkun Jiang reported that there is a small window of opportunity for
userspace to force a change of affinity for a VPE while the VPE has already
been unmapped, but the corresponding doorbell interrupt still visible in
/proc/irq/.

Plug the race by checking the value of vmapp_count, which tracks whether
the VPE is mapped ot not, and returning an error in this case.

This involves making vmapp_count common to both GICv4.1 and its v4.0
ancestor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233106">SUSE bug 1233106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50194</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50194" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Fix uprobes for big-endian kernels

The arm64 uprobes code is broken for big-endian kernels as it doesn't
convert the in-memory instruction encoding (which is always
little-endian) into the kernel's native endianness before analyzing and
simulating instructions. This may result in a few distinct problems:

* The kernel may may erroneously reject probing an instruction which can
  safely be probed.

* The kernel may erroneously erroneously permit stepping an
  instruction out-of-line when that instruction cannot be stepped
  out-of-line safely.

* The kernel may erroneously simulate instruction incorrectly dur to
  interpretting the byte-swapped encoding.

The endianness mismatch isn't caught by the compiler or sparse because:

* The arch_uprobe::{insn,ixol} fields are encoded as arrays of u8, so
  the compiler and sparse have no idea these contain a little-endian
  32-bit value. The core uprobes code populates these with a memcpy()
  which similarly does not handle endianness.

* While the uprobe_opcode_t type is an alias for __le32, both
  arch_uprobe_analyze_insn() and arch_uprobe_skip_sstep() cast from u8[]
  to the similarly-named probe_opcode_t, which is an alias for u32.
  Hence there is no endianness conversion warning.

Fix this by changing the arch_uprobe::{insn,ixol} fields to __le32 and
adding the appropriate __le32_to_cpu() conversions prior to consuming
the instruction encoding. The core uprobes copies these fields as opaque
ranges of bytes, and so is unaffected by this change.

At the same time, remove MAX_UINSN_BYTES and consistently use
AARCH64_INSN_SIZE for clarity.

Tested with the following:

| #include &lt;stdio.h&gt;
| #include &lt;stdbool.h&gt;
|
| #define noinline __attribute__((noinline))
|
| static noinline void *adrp_self(void)
| {
|         void *addr;
|
|         asm volatile(
|         "       adrp    %x0, adrp_self\n"
|         "       add     %x0, %x0, :lo12:adrp_self\n"
|         : "=r" (addr));
| }
|
|
| int main(int argc, char *argv)
| {
|         void *ptr = adrp_self();
|         bool equal = (ptr == adrp_self);
|
|         printf("adrp_self   =&gt; %p\n"
|                "adrp_self() =&gt; %p\n"
|                "%s\n",
|                adrp_self, ptr, equal ? "EQUAL" : "NOT EQUAL");
|
|         return 0;
| }

.... where the adrp_self() function was compiled to:

| 00000000004007e0 &lt;adrp_self&gt;:
|   4007e0:       90000000        adrp    x0, 400000 &lt;__ehdr_start&gt;
|   4007e4:       911f8000        add     x0, x0, #0x7e0
|   4007e8:       d65f03c0        ret

Before this patch, the ADRP is not recognized, and is assumed to be
steppable, resulting in corruption of the result:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0xffffffffff7e0
| NOT EQUAL

After this patch, the ADRP is correctly recognized and simulated:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| #
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233111">SUSE bug 1233111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50195</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-clock: Fix missing timespec64 check in pc_clock_settime()

As Andrew pointed out, it will make sense that the PTP core
checked timespec64 struct's tv_sec and tv_nsec range before calling
ptp-&gt;info-&gt;settime64().

As the man manual of clock_settime() said, if tp.tv_sec is negative or
tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL,
which include dynamic clocks which handles PTP clock, and the condition is
consistent with timespec64_valid(). As Thomas suggested, timespec64_valid()
only check the timespec is valid, but not ensure that the time is
in a valid range, so check it ahead using timespec64_valid_strict()
in pc_clock_settime() and return -EINVAL if not valid.

There are some drivers that use tp-&gt;tv_sec and tp-&gt;tv_nsec directly to
write registers without validity checks and assume that the higher layer
has checked it, which is dangerous and will benefit from this, such as
hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(),
and some drivers can remove the checks of itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233103">SUSE bug 1233103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50196</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50196" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: ocelot: fix system hang on level based interrupts

The current implementation only calls chained_irq_enter() and
chained_irq_exit() if it detects pending interrupts.

```
for (i = 0; i &lt; info-&gt;stride; i++) {
	uregmap_read(info-&gt;map, id_reg + 4 * i, &amp;reg);
	if (!reg)
		continue;

	chained_irq_enter(parent_chip, desc);
```

However, in case of GPIO pin configured in level mode and the parent
controller configured in edge mode, GPIO interrupt might be lowered by the
hardware. In the result, if the interrupt is short enough, the parent
interrupt is still pending while the GPIO interrupt is cleared;
chained_irq_enter() never gets called and the system hangs trying to
service the parent interrupt.

Moving chained_irq_enter() and chained_irq_exit() outside the for loop
ensures that they are called even when GPIO interrupt is lowered by the
hardware.

The similar code with chained_irq_enter() / chained_irq_exit() functions
wrapping interrupt checking loop may be found in many other drivers:
```
grep -r -A 10 chained_irq_enter drivers/pinctrl
```
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233113">SUSE bug 1233113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50198</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50198" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: light: veml6030: fix IIO device retrieval from embedded device

The dev pointer that is received as an argument in the
in_illuminance_period_available_show function references the device
embedded in the IIO device, not in the i2c client.

dev_to_iio_dev() must be used to accessthe right data. The current
implementation leads to a segmentation fault on every attempt to read
the attribute because indio_dev gets a NULL assignment.

This bug has been present since the first appearance of the driver,
apparently since the last version (V6) before getting applied. A
constant attribute was used until then, and the last modifications might
have not been tested again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233100">SUSE bug 1233100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50201</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix encoder-&gt;possible_clones

Include the encoder itself in its possible_clones bitmask.
In the past nothing validated that drivers were populating
possible_clones correctly, but that changed in commit
74d2aacbe840 ("drm: Validate encoder-&gt;possible_clones").
Looks like radeon never got the memo and is still not
following the rules 100% correctly.

This results in some warnings during driver initialization:
Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7)
WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c
...

(cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233104">SUSE bug 1233104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50205</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50205" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()

The step variable is initialized to zero. It is changed in the loop,
but if it's not changed it will remain zero. Add a variable check
before the division.

The observed behavior was introduced by commit 826b5de90c0b
("ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size"),
and it is difficult to show that any of the interval parameters will
satisfy the snd_interval_test() condition with data from the
amdtp_rate_table[] table.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233294">SUSE bug 1233294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50208</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages

Avoid memory corruption while setting up Level-2 PBL pages for the non MR
resources when num_pages &gt; 256K.

There will be a single PDE page address (contiguous pages in the case of &gt;
PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid
memory access after 256K PBL entries in the PDE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233118">SUSE bug 1233118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50209</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50209" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Add a check for memory allocation

__alloc_pbl() can return error when memory allocation fails.
Driver is not checking the status on one of the instances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233114">SUSE bug 1233114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50215</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-auth: assign dh_key to NULL after kfree_sensitive

ctrl-&gt;dh_key might be used across multiple calls to nvmet_setup_dhgroup()
for the same controller. So it's better to nullify it after release on
error path in order to avoid double free later in nvmet_destroy_auth().

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233189">SUSE bug 1233189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50218</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow

Syzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two
reasons for this: first, the parameter value passed is greater than
ocfs2_max_inline_data_with_xattr, second, the start and end parameters of
ocfs2_truncate_inline are "unsigned int".

So, we need to add a sanity check for byte_start and byte_len right before
ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater
than ocfs2_max_inline_data_with_xattr return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233191">SUSE bug 1233191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50229</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential deadlock with newly created symlinks

Syzbot reported that page_symlink(), called by nilfs_symlink(), triggers
memory reclamation involving the filesystem layer, which can result in
circular lock dependencies among the reader/writer semaphore
nilfs-&gt;ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the
fs_reclaim pseudo lock.

This is because after commit 21fc61c73c39 ("don't put symlink bodies in
pagecache into highmem"), the gfp flags of the page cache for symbolic
links are overwritten to GFP_KERNEL via inode_nohighmem().

This is not a problem for symlinks read from the backing device, because
the __GFP_FS flag is dropped after inode_nohighmem() is called.  However,
when a new symlink is created with nilfs_symlink(), the gfp flags remain
overwritten to GFP_KERNEL.  Then, memory allocation called from
page_symlink() etc.  triggers memory reclamation including the FS layer,
which may call nilfs_evict_inode() or nilfs_dirty_inode().  And these can
cause a deadlock if they are called while nilfs-&gt;ns_segctor_sem is held:

Fix this issue by dropping the __GFP_FS flag from the page cache GFP flags
of newly created symlinks in the same way that nilfs_new_inode() and
__nilfs_read_inode() do, as a workaround until we adopt nofs allocation
scope consistently or improve the locking constraints.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233205">SUSE bug 1233205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50230</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug due to missing clearing of checked flag

Syzbot reported that in directory operations after nilfs2 detects
filesystem corruption and degrades to read-only,
__block_write_begin_int(), which is called to prepare block writes, may
fail the BUG_ON check for accesses exceeding the folio/page size,
triggering a kernel bug.

This was found to be because the "checked" flag of a page/folio was not
cleared when it was discarded by nilfs2's own routine, which causes the
sanity check of directory entries to be skipped when the directory
page/folio is reloaded.  So, fix that.

This was necessary when the use of nilfs2's own page discard routine was
applied to more than just metadata files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233206">SUSE bug 1233206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()

In the ad7124_write_raw() function, parameter val can potentially
be zero. This may lead to a division by zero when DIV_ROUND_CLOSEST()
is called within ad7124_set_channel_odr(). The ad7124_write_raw()
function is invoked through the sequence: iio_write_channel_raw() -&gt;
iio_write_channel_attribute() -&gt; iio_channel_write(), with no checks
in place to ensure val is non-zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233209">SUSE bug 1233209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50233</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()

In the ad9832_write_frequency() function, clk_get_rate() might return 0.
This can lead to a division by zero when calling ad9832_calc_freqreg().
The check if (fout &gt; (clk_get_rate(st-&gt;mclk) / 2)) does not protect
against the case when fout is 0. The ad9832_write_frequency() function
is called from ad9832_write(), and fout is derived from a text buffer,
which can contain any value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233210">SUSE bug 1233210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50234</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50234" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50234" ref_url="https://www.suse.com/security/cve/CVE-2024-50234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlegacy: Clear stale interrupts before resuming device

iwl4965 fails upon resume from hibernation on my laptop. The reason
seems to be a stale interrupt which isn't being cleared out before
interrupts are enabled. We end up with a race beween the resume
trying to bring things back up, and the restart work (queued form
the interrupt handler) trying to bring things down. Eventually
the whole thing blows up.

Fix the problem by clearing out any stale interrupts before
interrupts get enabled during resume.

Here's a debug log of the indicent:
[   12.042589] ieee80211 phy0: il_isr ISR inta 0x00000080, enabled 0xaa00008b, fh 0x00000000
[   12.042625] ieee80211 phy0: il4965_irq_tasklet inta 0x00000080, enabled 0x00000000, fh 0x00000000
[   12.042651] iwl4965 0000:10:00.0: RF_KILL bit toggled to enable radio.
[   12.042653] iwl4965 0000:10:00.0: On demand firmware reload
[   12.042690] ieee80211 phy0: il4965_irq_tasklet End inta 0x00000000, enabled 0xaa00008b, fh 0x00000000, flags 0x00000282
[   12.052207] ieee80211 phy0: il4965_mac_start enter
[   12.052212] ieee80211 phy0: il_prep_station Add STA to driver ID 31: ff:ff:ff:ff:ff:ff
[   12.052244] ieee80211 phy0: il4965_set_hw_ready hardware  ready
[   12.052324] ieee80211 phy0: il_apm_init Init card's basic functions
[   12.052348] ieee80211 phy0: il_apm_init L1 Enabled; Disabling L0S
[   12.055727] ieee80211 phy0: il4965_load_bsm Begin load bsm
[   12.056140] ieee80211 phy0: il4965_verify_bsm Begin verify bsm
[   12.058642] ieee80211 phy0: il4965_verify_bsm BSM bootstrap uCode image OK
[   12.058721] ieee80211 phy0: il4965_load_bsm BSM write complete, poll 1 iterations
[   12.058734] ieee80211 phy0: __il4965_up iwl4965 is coming up
[   12.058737] ieee80211 phy0: il4965_mac_start Start UP work done.
[   12.058757] ieee80211 phy0: __il4965_down iwl4965 is going down
[   12.058761] ieee80211 phy0: il_scan_cancel_timeout Scan cancel timeout
[   12.058762] ieee80211 phy0: il_do_scan_abort Not performing scan to abort
[   12.058765] ieee80211 phy0: il_clear_ucode_stations Clearing ucode stations in driver
[   12.058767] ieee80211 phy0: il_clear_ucode_stations No active stations found to be cleared
[   12.058819] ieee80211 phy0: _il_apm_stop Stop card, put in low power state
[   12.058827] ieee80211 phy0: _il_apm_stop_master stop master
[   12.058864] ieee80211 phy0: il4965_clear_free_frames 0 frames on pre-allocated heap on clear.
[   12.058869] ieee80211 phy0: Hardware restart was requested
[   16.132299] iwl4965 0000:10:00.0: START_ALIVE timeout after 4000ms.
[   16.132303] ------------[ cut here ]------------
[   16.132304] Hardware became unavailable upon resume. This could be a software issue prior to suspend or a hardware issue.
[   16.132338] WARNING: CPU: 0 PID: 181 at net/mac80211/util.c:1826 ieee80211_reconfig+0x8f/0x14b0 [mac80211]
[   16.132390] Modules linked in: ctr ccm sch_fq_codel xt_tcpudp xt_multiport xt_state iptable_filter iptable_nat nf_nat nf_conntrack nf_defrag_ipv4 ip_tables x_tables binfmt_misc joydev mousedev btusb btrtl btintel btbcm bluetooth ecdh_generic ecc iTCO_wdt i2c_dev iwl4965 iwlegacy coretemp snd_hda_codec_analog pcspkr psmouse mac80211 snd_hda_codec_generic libarc4 sdhci_pci cqhci sha256_generic sdhci libsha256 firewire_ohci snd_hda_intel snd_intel_dspcfg mmc_core snd_hda_codec snd_hwdep firewire_core led_class iosf_mbi snd_hda_core uhci_hcd lpc_ich crc_itu_t cfg80211 ehci_pci ehci_hcd snd_pcm usbcore mfd_core rfkill snd_timer snd usb_common soundcore video parport_pc parport intel_agp wmi intel_gtt backlight e1000e agpgart evdev
[   16.132456] CPU: 0 UID: 0 PID: 181 Comm: kworker/u8:6 Not tainted 6.11.0-cl+ #143
[   16.132460] Hardware name: Hewlett-Packard HP Compaq 6910p/30BE, BIOS 68MCU Ver. F.19 07/06/2010
[   16.132463] Workqueue: async async_run_entry_fn
[   16.132469] RIP: 0010:ieee80211_reconfig+0x8f/0x14b0 [mac80211]
[   16.132501] Code: da 02 00 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50234/">CVE-2024-50234 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233211">SUSE bug 1233211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50236</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Fix memory leak in management tx

In the current logic, memory is allocated for storing the MSDU context
during management packet TX but this memory is not being freed during
management TX completion. Similar leaks are seen in the management TX
cleanup logic.

Kmemleak reports this problem as below,

unreferenced object 0xffffff80b64ed250 (size 16):
  comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
  hex dump (first 16 bytes):
    00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......
  backtrace:
    [&lt;ffffffe6e7b245dc&gt;] __kmem_cache_alloc_node+0x1e4/0x2d8
    [&lt;ffffffe6e7adde88&gt;] kmalloc_trace+0x48/0x110
    [&lt;ffffffe6bbd765fc&gt;] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
    [&lt;ffffffe6bbd3eed4&gt;] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
    [&lt;ffffffe6e78d5974&gt;] process_scheduled_works+0x1ac/0x400
    [&lt;ffffffe6e78d60b8&gt;] worker_thread+0x208/0x328
    [&lt;ffffffe6e78dc890&gt;] kthread+0x100/0x1c0
    [&lt;ffffffe6e78166c0&gt;] ret_from_fork+0x10/0x20

Free the memory during completion and cleanup to fix the leak.

Protect the mgmt_pending_tx idr_remove() operation in
ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar-&gt;data_lock similar to
other instances.

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233212">SUSE bug 1233212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50237</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower

Avoid potentially crashing in the driver because of uninitialized private data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233216">SUSE bug 1233216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50249</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Make rmw_lock a raw_spin_lock

The following BUG was triggered:

=============================
[ BUG: Invalid wait context ]
6.12.0-rc2-XXX #406 Not tainted
-----------------------------
kworker/1:1/62 is trying to lock:
ffffff8801593030 (&amp;cpc_ptr-&gt;rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370
other info that might help us debug this:
context-{5:5}
2 locks held by kworker/1:1/62:
  #0: ffffff897ef5ec98 (&amp;rq-&gt;__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50
  #1: ffffff880154e238 (&amp;sg_policy-&gt;update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280
stack backtrace:
CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406
Workqueue:  0x0 (events)
Call trace:
  dump_backtrace+0xa4/0x130
  show_stack+0x20/0x38
  dump_stack_lvl+0x90/0xd0
  dump_stack+0x18/0x28
  __lock_acquire+0x480/0x1ad8
  lock_acquire+0x114/0x310
  _raw_spin_lock+0x50/0x70
  cpc_write+0xcc/0x370
  cppc_set_perf+0xa0/0x3a8
  cppc_cpufreq_fast_switch+0x40/0xc0
  cpufreq_driver_fast_switch+0x4c/0x218
  sugov_update_shared+0x234/0x280
  update_load_avg+0x6ec/0x7b8
  dequeue_entities+0x108/0x830
  dequeue_task_fair+0x58/0x408
  __schedule+0x4f0/0x1070
  schedule+0x54/0x130
  worker_thread+0xc0/0x2e8
  kthread+0x130/0x148
  ret_from_fork+0x10/0x20

sugov_update_shared() locks a raw_spinlock while cpc_write() locks a
spinlock.

To have a correct wait-type order, update rmw_lock to a raw spinlock and
ensure that interrupts will be disabled on the CPU holding it.

[ rjw: Changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233197">SUSE bug 1233197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50255</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs

Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes.

__hci_cmd_sync_sk() returns NULL if a command returns a status event.
However, it also returns NULL where an opcode doesn't exist in the
hci_cc table because hci_cmd_complete_evt() assumes status = skb-&gt;data[0]
for unknown opcodes.
This leads to null-ptr-deref in cmd_sync for HCI_OP_READ_LOCAL_CODECS as
there is no hci_cc for HCI_OP_READ_LOCAL_CODECS, which always assumes
status = skb-&gt;data[0].

KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]
CPU: 1 PID: 2000 Comm: kworker/u9:5 Not tainted 6.9.0-ga6bcb805883c-dirty #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci7 hci_power_on
RIP: 0010:hci_read_supported_codecs+0xb9/0x870 net/bluetooth/hci_codec.c:138
Code: 08 48 89 ef e8 b8 c1 8f fd 48 8b 75 00 e9 96 00 00 00 49 89 c6 48 ba 00 00 00 00 00 fc ff df 4c 8d 60 70 4c 89 e3 48 c1 eb 03 &lt;0f&gt; b6 04 13 84 c0 0f 85 82 06 00 00 41 83 3c 24 02 77 0a e8 bf 78
RSP: 0018:ffff888120bafac8 EFLAGS: 00010212
RAX: 0000000000000000 RBX: 000000000000000e RCX: ffff8881173f0040
RDX: dffffc0000000000 RSI: ffffffffa58496c0 RDI: ffff88810b9ad1e4
RBP: ffff88810b9ac000 R08: ffffffffa77882a7 R09: 1ffffffff4ef1054
R10: dffffc0000000000 R11: fffffbfff4ef1055 R12: 0000000000000070
R13: 0000000000000000 R14: 0000000000000000 R15: ffff88810b9ac000
FS:  0000000000000000(0000) GS:ffff8881f6c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6ddaa3439e CR3: 0000000139764003 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 hci_read_local_codecs_sync net/bluetooth/hci_sync.c:4546 [inline]
 hci_init_stage_sync net/bluetooth/hci_sync.c:3441 [inline]
 hci_init4_sync net/bluetooth/hci_sync.c:4706 [inline]
 hci_init_sync net/bluetooth/hci_sync.c:4742 [inline]
 hci_dev_init_sync net/bluetooth/hci_sync.c:4912 [inline]
 hci_dev_open_sync+0x19a9/0x2d30 net/bluetooth/hci_sync.c:4994
 hci_dev_do_open net/bluetooth/hci_core.c:483 [inline]
 hci_power_on+0x11e/0x560 net/bluetooth/hci_core.c:1015
 process_one_work kernel/workqueue.c:3267 [inline]
 process_scheduled_works+0x8ef/0x14f0 kernel/workqueue.c:3348
 worker_thread+0x91f/0xe50 kernel/workqueue.c:3429
 kthread+0x2cb/0x360 kernel/kthread.c:388
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233238">SUSE bug 1233238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50259</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50259" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()

This was found by a static analyzer.
We should not forget the trailing zero after copy_from_user()
if we will further do some string operations, sscanf() in this
case. Adding a trailing zero will ensure that the function
performs properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233215">SUSE bug 1233215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50261</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macsec: Fix use-after-free while sending the offloading packet

KASAN reports the following UAF. The metadata_dst, which is used to
store the SCI value for macsec offload, is already freed by
metadata_dst_free() in macsec_free_netdev(), while driver still use it
for sending the packet.

To fix this issue, dst_release() is used instead to release
metadata_dst. So it is not freed instantly in macsec_free_netdev() if
still referenced by skb.

 BUG: KASAN: slab-use-after-free in mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
 Read of size 2 at addr ffff88813e42e038 by task kworker/7:2/714
 [...]
 Workqueue: mld mld_ifc_work
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x51/0x60
  print_report+0xc1/0x600
  kasan_report+0xab/0xe0
  mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
  dev_hard_start_xmit+0x120/0x530
  sch_direct_xmit+0x149/0x11e0
  __qdisc_run+0x3ad/0x1730
  __dev_queue_xmit+0x1196/0x2ed0
  vlan_dev_hard_start_xmit+0x32e/0x510 [8021q]
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  macsec_start_xmit+0x13e9/0x2340
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  ip6_finish_output2+0x923/0x1a70
  ip6_finish_output+0x2d7/0x970
  ip6_output+0x1ce/0x3a0
  NF_HOOK.constprop.0+0x15f/0x190
  mld_sendpack+0x59a/0xbd0
  mld_ifc_work+0x48a/0xa80
  process_one_work+0x5aa/0xe50
  worker_thread+0x79c/0x1290
  kthread+0x28f/0x350
  ret_from_fork+0x2d/0x70
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

 Allocated by task 3922:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  __kasan_kmalloc+0x77/0x90
  __kmalloc_noprof+0x188/0x400
  metadata_dst_alloc+0x1f/0x4e0
  macsec_newlink+0x914/0x1410
  __rtnl_newlink+0xe08/0x15b0
  rtnl_newlink+0x5f/0x90
  rtnetlink_rcv_msg+0x667/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 Freed by task 4011:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  kasan_save_free_info+0x37/0x50
  poison_slab_object+0x10c/0x190
  __kasan_slab_free+0x11/0x30
  kfree+0xe0/0x290
  macsec_free_netdev+0x3f/0x140
  netdev_run_todo+0x450/0xc70
  rtnetlink_rcv_msg+0x66f/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233253">SUSE bug 1233253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50264</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans

During loopback communication, a dangling pointer can be created in
vsk-&gt;trans, potentially leading to a Use-After-Free condition.  This
issue is resolved by initializing vsk-&gt;trans to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233712">SUSE bug 1233712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50265</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50265" ref_url="https://www.suse.com/security/cve/CVE-2024-50265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()

Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove():

[   57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: status = -12
[   57.320420] (a.out,1161,7):ocfs2_xa_cleanup_value_truncate:1999 ERROR: Partial truncate while removing xattr overlay.upper.  Leaking 1 clusters and removing the entry
[   57.321727] BUG: kernel NULL pointer dereference, address: 0000000000000004
[...]
[   57.325727] RIP: 0010:ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[...]
[   57.331328] Call Trace:
[   57.331477]  &lt;TASK&gt;
[...]
[   57.333511]  ? do_user_addr_fault+0x3e5/0x740
[   57.333778]  ? exc_page_fault+0x70/0x170
[   57.334016]  ? asm_exc_page_fault+0x2b/0x30
[   57.334263]  ? __pfx_ocfs2_xa_block_wipe_namevalue+0x10/0x10
[   57.334596]  ? ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[   57.334913]  ocfs2_xa_remove_entry+0x23/0xc0
[   57.335164]  ocfs2_xa_set+0x704/0xcf0
[   57.335381]  ? _raw_spin_unlock+0x1a/0x40
[   57.335620]  ? ocfs2_inode_cache_unlock+0x16/0x20
[   57.335915]  ? trace_preempt_on+0x1e/0x70
[   57.336153]  ? start_this_handle+0x16c/0x500
[   57.336410]  ? preempt_count_sub+0x50/0x80
[   57.336656]  ? _raw_read_unlock+0x20/0x40
[   57.336906]  ? start_this_handle+0x16c/0x500
[   57.337162]  ocfs2_xattr_block_set+0xa6/0x1e0
[   57.337424]  __ocfs2_xattr_set_handle+0x1fd/0x5d0
[   57.337706]  ? ocfs2_start_trans+0x13d/0x290
[   57.337971]  ocfs2_xattr_set+0xb13/0xfb0
[   57.338207]  ? dput+0x46/0x1c0
[   57.338393]  ocfs2_xattr_trusted_set+0x28/0x30
[   57.338665]  ? ocfs2_xattr_trusted_set+0x28/0x30
[   57.338948]  __vfs_removexattr+0x92/0xc0
[   57.339182]  __vfs_removexattr_locked+0xd5/0x190
[   57.339456]  ? preempt_count_sub+0x50/0x80
[   57.339705]  vfs_removexattr+0x5f/0x100
[...]

Reproducer uses faultinject facility to fail ocfs2_xa_remove() -&gt;
ocfs2_xa_value_truncate() with -ENOMEM.

In this case the comment mentions that we can return 0 if
ocfs2_xa_cleanup_value_truncate() is going to wipe the entry
anyway. But the following 'rc' check is wrong and execution flow do
'ocfs2_xa_remove_entry(loc);' twice:
* 1st: in ocfs2_xa_cleanup_value_truncate();
* 2nd: returning back to ocfs2_xa_remove() instead of going to 'out'.

Fix this by skipping the 2nd removal of the same entry and making
syzkaller repro happy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-50265/">CVE-2024-50265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233454">SUSE bug 1233454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50267</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: serial: io_edgeport: fix use after free in debug printk

The "dev_dbg(&amp;urb-&gt;dev-&gt;dev, ..." which happens after usb_free_urb(urb)
is a use after free of the "urb" pointer.  Store the "dev" pointer at the
start of the function to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233711">SUSE bug 1233711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50268</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50268" ref_url="https://www.suse.com/security/cve/CVE-2024-50268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()

The "*cmd" variable can be controlled by the user via debugfs.  That means
"new_cam" can be as high as 255 while the size of the uc-&gt;updated[] array
is UCSI_MAX_ALTMODES (30).

The call tree is:
ucsi_cmd() // val comes from simple_attr_write_xsigned()
-&gt; ucsi_send_command()
   -&gt; ucsi_send_command_common()
      -&gt; ucsi_run_command() // calls ucsi-&gt;ops-&gt;sync_control()
         -&gt; ucsi_ccg_sync_control()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50268/">CVE-2024-50268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233457">SUSE bug 1233457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50269</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50269" ref_url="https://www.suse.com/security/cve/CVE-2024-50269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: sunxi: Fix accessing an released usb phy

Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on
exit") will cause that usb phy @glue-&gt;xceiv is accessed after released.

1) register platform driver @sunxi_musb_driver
// get the usb phy @glue-&gt;xceiv
sunxi_musb_probe() -&gt; devm_usb_get_phy().

2) register and unregister platform driver @musb_driver
musb_probe() -&gt; sunxi_musb_init()
use the phy here
//the phy is released here
musb_remove() -&gt; sunxi_musb_exit() -&gt; devm_usb_put_phy()

3) register @musb_driver again
musb_probe() -&gt; sunxi_musb_init()
use the phy here but the phy has been released at 2).
...

Fixed by reverting the commit, namely, removing devm_usb_put_phy()
from sunxi_musb_exit().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50269/">CVE-2024-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233458">SUSE bug 1233458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50271</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

signal: restore the override_rlimit logic

Prior to commit d64696905554 ("Reimplement RLIMIT_SIGPENDING on top of
ucounts") UCOUNT_RLIMIT_SIGPENDING rlimit was not enforced for a class of
signals.  However now it's enforced unconditionally, even if
override_rlimit is set.  This behavior change caused production issues.  

For example, if the limit is reached and a process receives a SIGSEGV
signal, sigqueue_alloc fails to allocate the necessary resources for the
signal delivery, preventing the signal from being delivered with siginfo. 
This prevents the process from correctly identifying the fault address and
handling the error.  From the user-space perspective, applications are
unaware that the limit has been reached and that the siginfo is
effectively 'corrupted'.  This can lead to unpredictable behavior and
crashes, as we observed with java applications.

Fix this by passing override_rlimit into inc_rlimit_get_ucounts() and skip
the comparison to max there if override_rlimit is set.  This effectively
restores the old behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233460">SUSE bug 1233460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50273</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50273" ref_url="https://www.suse.com/security/cve/CVE-2024-50273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: reinitialize delayed ref list after deleting it from the list

At insert_delayed_ref() if we need to update the action of an existing
ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's
ref_add_list using list_del(), which leaves the ref's add_list member
not reinitialized, as list_del() sets the next and prev members of the
list to LIST_POISON1 and LIST_POISON2, respectively.

If later we end up calling drop_delayed_ref() against the ref, which can
happen during merging or when destroying delayed refs due to a transaction
abort, we can trigger a crash since at drop_delayed_ref() we call
list_empty() against the ref's add_list, which returns false since
the list was not reinitialized after the list_del() and as a consequence
we call list_del() again at drop_delayed_ref(). This results in an
invalid list access since the next and prev members are set to poison
pointers, resulting in a splat if CONFIG_LIST_HARDENED and
CONFIG_DEBUG_LIST are set or invalid poison pointer dereferences
otherwise.

So fix this by deleting from the list with list_del_init() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50273/">CVE-2024-50273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233462">SUSE bug 1233462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50274</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50274" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: avoid vport access in idpf_get_link_ksettings

When the device control plane is removed or the platform
running device control plane is rebooted, a reset is detected
on the driver. On driver reset, it releases the resources and
waits for the reset to complete. If the reset fails, it takes
the error path and releases the vport lock. At this time if the
monitoring tools tries to access link settings, it call traces
for accessing released vport pointer.

To avoid it, move link_speed_mbps to netdev_priv structure
which removes the dependency on vport pointer and the vport lock
in idpf_get_link_ksettings. Also use netif_carrier_ok()
to check the link status and adjust the offsetof to use link_up
instead of link_speed_mbps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235104">SUSE bug 1235104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50279</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix out-of-bounds access to the dirty bitset when resizing

dm-cache checks the dirty bits of the cache blocks to be dropped when
shrinking the fast device, but an index bug in bitset iteration causes
out-of-bounds access.

Reproduce steps:

1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. shrink the fast device to 512 cache blocks, triggering out-of-bounds
   access to the dirty bitset (offset 0x80)

dmsetup suspend cache
dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0
  Read of size 8 at addr ffffc900000f3080 by task dmsetup/131

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc900000f3000, ffffc900000f5000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  &gt;ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
                     ^
   ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by making the index post-incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233708">SUSE bug 1233708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50282</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()

Avoid a possible buffer overflow if size is larger than 4K.

(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233471">SUSE bug 1233471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233707">SUSE bug 1233707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50287</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50287" ref_url="https://www.suse.com/security/cve/CVE-2024-50287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-tpg: prevent the risk of a division by zero

As reported by Coverity, the logic at tpg_precalculate_line()
blindly rescales the buffer even when scaled_witdh is equal to
zero. If this ever happens, this will cause a division by zero.

Instead, add a WARN_ON_ONCE() to trigger such cases and return
without doing any precalculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50287/">CVE-2024-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233476">SUSE bug 1233476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50289</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50289" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50289" ref_url="https://www.suse.com/security/cve/CVE-2024-50289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: av7110: fix a spectre vulnerability

As warned by smatch:
	drivers/staging/media/av7110/av7110_ca.c:270 dvb_ca_ioctl() warn: potential spectre issue 'av7110-&gt;ci_slot' [w] (local cap)

There is a spectre-related vulnerability at the code. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-50289/">CVE-2024-50289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50289">CVE-2024-50289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233478">SUSE bug 1233478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50290</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: cx24116: prevent overflows on SNR calculus

as reported by Coverity, if reading SNR registers fail, a negative
number will be returned, causing an underflow when reading SNR
registers.

Prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233681">SUSE bug 1233681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50292</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50292" ref_url="https://www.suse.com/security/cve/CVE-2024-50292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove

In case of error when requesting ctrl_chan DMA channel, ctrl_chan is not
null. So the release of the dma channel leads to the following issue:
[    4.879000] st,stm32-spdifrx 500d0000.audio-controller:
dma_request_slave_channel error -19
[    4.888975] Unable to handle kernel NULL pointer dereference
at virtual address 000000000000003d
[...]
[    5.096577] Call trace:
[    5.099099]  dma_release_channel+0x24/0x100
[    5.103235]  stm32_spdifrx_remove+0x24/0x60 [snd_soc_stm32_spdifrx]
[    5.109494]  stm32_spdifrx_probe+0x320/0x4c4 [snd_soc_stm32_spdifrx]

To avoid this issue, release channel only if the pointer is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50292/">CVE-2024-50292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233481">SUSE bug 1233481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50295</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50295" ref_url="https://www.suse.com/security/cve/CVE-2024-50295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: arc: fix the device for dma_map_single/dma_unmap_single

The ndev-&gt;dev and pdev-&gt;dev aren't the same device, use ndev-&gt;dev.parent
which has dma_mask, ndev-&gt;dev.parent is just pdev-&gt;dev.
Or it would cause the following issue:

[   39.933526] ------------[ cut here ]------------
[   39.938414] WARNING: CPU: 1 PID: 501 at kernel/dma/mapping.c:149 dma_map_page_attrs+0x90/0x1f8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50295/">CVE-2024-50295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233484">SUSE bug 1233484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50298</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50298" ref_url="https://www.suse.com/security/cve/CVE-2024-50298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: allocate vf_state during PF probes

In the previous implementation, vf_state is allocated memory only when VF
is enabled. However, net_device_ops::ndo_set_vf_mac() may be called before
VF is enabled to configure the MAC address of VF. If this is the case,
enetc_pf_set_vf_mac() will access vf_state, resulting in access to a null
pointer. The simplified error log is as follows.

root@ls1028ardb:~# ip link set eno0 vf 1 mac 00:0c:e7:66:77:89
[  173.543315] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
[  173.637254] pc : enetc_pf_set_vf_mac+0x3c/0x80 Message from sy
[  173.641973] lr : do_setlink+0x4a8/0xec8
[  173.732292] Call trace:
[  173.734740]  enetc_pf_set_vf_mac+0x3c/0x80
[  173.738847]  __rtnl_newlink+0x530/0x89c
[  173.742692]  rtnl_newlink+0x50/0x7c
[  173.746189]  rtnetlink_rcv_msg+0x128/0x390
[  173.750298]  netlink_rcv_skb+0x60/0x130
[  173.754145]  rtnetlink_rcv+0x18/0x24
[  173.757731]  netlink_unicast+0x318/0x380
[  173.761665]  netlink_sendmsg+0x17c/0x3c8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50298/">CVE-2024-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233487">SUSE bug 1233487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50301</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

security/keys: fix slab-out-of-bounds in key_task_permission

KASAN reports an out of bounds read:
BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36
BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]
BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410
security/keys/permission.c:54
Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362

CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0x107/0x167 lib/dump_stack.c:123
 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 __kuid_val include/linux/uidgid.h:36 [inline]
 uid_eq include/linux/uidgid.h:63 [inline]
 key_task_permission+0x394/0x410 security/keys/permission.c:54
 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793

This issue was also reported by syzbot.

It can be reproduced by following these steps(more details [1]):
1. Obtain more than 32 inputs that have similar hashes, which ends with the
   pattern '0xxxxxxxe6'.
2. Reboot and add the keys obtained in step 1.

The reproducer demonstrates how this issue happened:
1. In the search_nested_keyrings function, when it iterates through the
   slots in a node(below tag ascend_to_node), if the slot pointer is meta
   and node-&gt;back_pointer != NULL(it means a root), it will proceed to
   descend_to_node. However, there is an exception. If node is the root,
   and one of the slots points to a shortcut, it will be treated as a
   keyring.
2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.
   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as
   ASSOC_ARRAY_PTR_SUBTYPE_MASK.
3. When 32 keys with the similar hashes are added to the tree, the ROOT
   has keys with hashes that are not similar (e.g. slot 0) and it splits
   NODE A without using a shortcut. When NODE A is filled with keys that
   all hashes are xxe6, the keys are similar, NODE A will split with a
   shortcut. Finally, it forms the tree as shown below, where slot 6 points
   to a shortcut.

                      NODE A
              +------&gt;+---+
      ROOT    |       | 0 | xxe6
      +---+   |       +---+
 xxxx | 0 | shortcut  :   : xxe6
      +---+   |       +---+
 xxe6 :   :   |       |   | xxe6
      +---+   |       +---+
      | 6 |---+       :   : xxe6
      +---+           +---+
 xxe6 :   :           | f | xxe6
      +---+           +---+
 xxe6 | f |
      +---+

4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,
   it may be mistakenly transferred to a key*, leading to a read
   out-of-bounds read.

To fix this issue, one should jump to descend_to_node if the ptr is a
shortcut, regardless of whether the node is root or not.

[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/

[jarkko: tweaked the commit message a bit to have an appropriate closes
 tag.]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233680">SUSE bug 1233680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50302</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233679">SUSE bug 1233679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50602</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000220.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9541" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAVLUAO5K6MJFTEJB4GJPOEFBO7TERI6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSPMMPTPAUGVEMQV4WR37XQICDFXWTS7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14457-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SP6G2HGBBIFIEGEE6GB4U2UPVC5XL57H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q6VPY7UYNTWIQZCAPDUIAN2AZRTCYK5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKOTUGA2O5N3MZDEKZ6VRDG7KV5LDOGO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14589-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3V7QAWJ6AWA3YEKX4DEGJFLTQ6ASRC3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14609-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AH5Z5BJKL2IEXW4VDPEM33Y47PIJHEHX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-19"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232579">SUSE bug 1232579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009953447" comment="libexpat1-2.4.4-150400.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52530</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9559" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9573" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000597.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9654" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958510" comment="libsoup-2_4-1-2.74.2-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52531</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR6TVFEO2A7NR2MI6QLABP2BHZUQEULO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. Input received over the network cannot trigger this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233292">SUSE bug 1233292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958510" comment="libsoup-2_4-1-2.74.2-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52532</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9559" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9573" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR6TVFEO2A7NR2MI6QLABP2BHZUQEULO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233287">SUSE bug 1233287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958510" comment="libsoup-2_4-1-2.74.2-150400.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52533</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4051-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019966.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDZ2T3NMB6ITHZZK4Z34LZGL42OJMYWP/" source="SUSE-SU"/>
    <description>
    gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233282">SUSE bug 1233282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955219" comment="glib2-tools-2.70.5-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955220" comment="libgio-2_0-0-2.70.5-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955221" comment="libglib-2_0-0-2.70.5-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955222" comment="libgmodule-2_0-0-2.70.5-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009955223" comment="libgobject-2_0-0-2.70.5-150400.3.17.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52616</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14538-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3ABDXZMFN73MQ62ZJOBQIVUE3HAEKVL/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233420">SUSE bug 1233420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958672" comment="avahi-0.8-150400.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958673" comment="libavahi-client3-0.8-150400.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958674" comment="libavahi-common3-0.8-150400.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958675" comment="libavahi-core7-0.8-150400.7.20.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53052</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233548">SUSE bug 1233548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53058</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53058" ref_url="https://www.suse.com/security/cve/CVE-2024-53058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53058/">CVE-2024-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53058">CVE-2024-53058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233552">SUSE bug 1233552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53059</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233553">SUSE bug 1233553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53060</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported

acpi_evaluate_object() may return AE_NOT_FOUND (failure), which
would result in dereferencing buffer.pointer (obj) while being NULL.

Although this case may be unrealistic for the current code, it is
still better to protect against possible bugs.

Bail out also when status is AE_NOT_FOUND.

This fixes 1 FORWARD_NULL issue reported by Coverity
Report: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)

(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233554">SUSE bug 1233554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53061</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233621">SUSE bug 1233621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53063</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233619">SUSE bug 1233619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53066</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53066" ref_url="https://www.suse.com/security/cve/CVE-2024-53066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53066/">CVE-2024-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233560">SUSE bug 1233560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53068</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233618">SUSE bug 1233618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53079</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53079" ref_url="https://www.suse.com/security/cve/CVE-2024-53079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/thp: fix deferred split unqueue naming and locking

Recent changes are putting more pressure on THP deferred split queues:
under load revealing long-standing races, causing list_del corruptions,
"Bad page state"s and worse (I keep BUGs in both of those, so usually
don't get to see how badly they end up without).  The relevant recent
changes being 6.8's mTHP, 6.10's mTHP swapout, and 6.12's mTHP swapin,
improved swap allocation, and underused THP splitting.

Before fixing locking: rename misleading folio_undo_large_rmappable(),
which does not undo large_rmappable, to folio_unqueue_deferred_split(),
which is what it does.  But that and its out-of-line __callee are mm
internals of very limited usability: add comment and WARN_ON_ONCEs to
check usage; and return a bool to say if a deferred split was unqueued,
which can then be used in WARN_ON_ONCEs around safety checks (sparing
callers the arcane conditionals in __folio_unqueue_deferred_split()).

Just omit the folio_unqueue_deferred_split() from free_unref_folios(), all
of whose callers now call it beforehand (and if any forget then bad_page()
will tell) - except for its caller put_pages_list(), which itself no
longer has any callers (and will be deleted separately).

Swapout: mem_cgroup_swapout() has been resetting folio-&gt;memcg_data 0
without checking and unqueueing a THP folio from deferred split list;
which is unfortunate, since the split_queue_lock depends on the memcg
(when memcg is enabled); so swapout has been unqueueing such THPs later,
when freeing the folio, using the pgdat's lock instead: potentially
corrupting the memcg's list.  __remove_mapping() has frozen refcount to 0
here, so no problem with calling folio_unqueue_deferred_split() before
resetting memcg_data.

That goes back to 5.4 commit 87eaceb3faa5 ("mm: thp: make deferred split
shrinker memcg aware"): which included a check on swapcache before adding
to deferred queue, but no check on deferred queue before adding THP to
swapcache.  That worked fine with the usual sequence of events in reclaim
(though there were a couple of rare ways in which a THP on deferred queue
could have been swapped out), but 6.12 commit dafff3f4c850 ("mm: split
underused THPs") avoids splitting underused THPs in reclaim, which makes
swapcache THPs on deferred queue commonplace.

Keep the check on swapcache before adding to deferred queue?  Yes: it is
no longer essential, but preserves the existing behaviour, and is likely
to be a worthwhile optimization (vmstat showed much more traffic on the
queue under swapping load if the check was removed); update its comment.

Memcg-v1 move (deprecated): mem_cgroup_move_account() has been changing
folio-&gt;memcg_data without checking and unqueueing a THP folio from the
deferred list, sometimes corrupting "from" memcg's list, like swapout. 
Refcount is non-zero here, so folio_unqueue_deferred_split() can only be
used in a WARN_ON_ONCE to validate the fix, which must be done earlier:
mem_cgroup_move_charge_pte_range() first try to split the THP (splitting
of course unqueues), or skip it if that fails.  Not ideal, but moving
charge has been requested, and khugepaged should repair the THP later:
nobody wants new custom unqueueing code just for this deprecated case.

The 87eaceb3faa5 commit did have the code to move from one deferred list
to another (but was not conscious of its unsafety while refcount non-0);
but that was removed by 5.6 commit fac0516b5534 ("mm: thp: don't need care
deferred split queue in memcg charge move path"), which argued that the
existence of a PMD mapping guarantees that the THP cannot be on a deferred
list.  As above, false in rare cases, and now commonly false.

Backport to 6.11 should be straightforward.  Earlier backports must take
care that other _deferred_list fixes and dependencies are included.  There
is not a strong case for backports, but they can fix cornercases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-53079/">CVE-2024-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233570">SUSE bug 1233570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53085</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Lock TPM chip in tpm_pm_suspend() first

Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy
according, as this leaves window for tpm_hwrng_read() to be called while
the operation is in progress. The recent bug report gives also evidence of
this behaviour.

Aadress this by locking the TPM chip before checking any chip-&gt;flags both
in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED
check inside tpm_get_random() so that it will be always checked only when
the lock is reserved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233577">SUSE bug 1233577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53088</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0065" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000741.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix race condition by adding filter's intermediate sync state

Fix a race condition in the i40e driver that leads to MAC/VLAN filters
becoming corrupted and leaking. Address the issue that occurs under
heavy load when multiple threads are concurrently modifying MAC/VLAN
filters by setting mac and port VLAN.

1. Thread T0 allocates a filter in i40e_add_filter() within
        i40e_ndo_set_vf_port_vlan().
2. Thread T1 concurrently frees the filter in __i40e_del_filter() within
        i40e_ndo_set_vf_mac().
3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which
        refers to the already freed filter memory, causing corruption.

Reproduction steps:
1. Spawn multiple VFs.
2. Apply a concurrent heavy load by running parallel operations to change
        MAC addresses on the VFs and change port VLANs on the host.
3. Observe errors in dmesg:
"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,
	please set promiscuous on manually for VF XX".

Exact code for stable reproduction Intel can't open-source now.

The fix involves implementing a new intermediate filter state,
I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.
These filters cannot be deleted from the hash list directly but
must be removed using the full process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233580">SUSE bug 1233580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53104</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53110</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vp_vdpa: fix id_table array not null terminated error

Allocate one extra virtio_device_id as null terminator, otherwise
vdpa_mgmtdev_get_classes() may iterate multiple times and visit
undefined memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234085">SUSE bug 1234085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958747" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958516" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54661</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWXJAVQD3HTBZI5EGK6RRHQ3EC55XXFL/" source="SUSE-SU"/>
    <description>
    readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225462">SUSE bug 1225462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009958009" comment="socat-1.8.0.0-150400.14.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152801" comment="socat is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5535</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036752.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.

Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.

The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).

This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.

In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.

This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227147">SUSE bug 1227147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879435" comment="libopenssl-1_1-devel-1.1.1l-150500.17.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231072" comment="libopenssl-1_1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879436" comment="libopenssl1_1-1.1.1l-150500.17.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177120" comment="libopenssl1_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879437" comment="libopenssl1_1-hmac-1.1.1l-150500.17.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231074" comment="libopenssl1_1-hmac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009879438" comment="openssl-1_1-1.1.1l-150500.17.34.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177122" comment="openssl-1_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5564</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018992.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225771">SUSE bug 1225771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009871289" comment="libndp0-1.6-150000.3.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154226" comment="libndp0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56326</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000759.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0006-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNJF5YIZCFWIYFLQBGRUQ2IHXCRQPMO/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020066.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234809">SUSE bug 1234809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009959155" comment="python3-Jinja2-2.10.1-150000.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253389" comment="python3-Jinja2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5642</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
    <description>
    CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945179" comment="libpython3_6m1_0-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945180" comment="python3-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945181" comment="python3-base-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6104</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6194" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9115" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2273-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZM3Q2GOCY2XWQUP7VK2V2KZENX5UIAN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2COZIDAEHXSE2NGBIJOMDBA64FCPZOP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2025-01-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227024">SUSE bug 1227024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945839" comment="podman-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945840" comment="podman-docker-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945841" comment="podman-remote-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945842" comment="podmansh-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6232</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8446" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000152.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8836" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8838" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9450" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000549.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9468" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKDHGTJKHTETAZ6BAHXXRCINJKQVWXGN/" source="SUSE-SU"/>
    <description>
    There is a MEDIUM severity vulnerability affecting CPython.





Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945179" comment="libpython3_6m1_0-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945180" comment="python3-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945181" comment="python3-base-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6345</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6311" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-11-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009881385" comment="python3-setuptools-44.1.1-150400.9.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009303048" comment="python3-setuptools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6655</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000074.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2661-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020067.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228120">SUSE bug 1228120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877665" comment="gtk2-tools-2.24.33-150400.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152026" comment="gtk2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877287" comment="gtk3-data-3.24.34-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877355" comment="gtk3-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877309" comment="gtk3-schema-3.24.34-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877377" comment="gtk3-schema is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877667" comment="gtk3-tools-3.24.34-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877378" comment="gtk3-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877666" comment="libgtk-2_0-0-2.24.33-150400.4.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152028" comment="libgtk-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877668" comment="libgtk-3-0-3.24.34-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877380" comment="libgtk-3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009877669" comment="typelib-1_0-Gtk-3_0-3.24.34-150400.3.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877382" comment="typelib-1_0-Gtk-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6923</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000009.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000013.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000077.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
    <description>
    There is a MEDIUM severity vulnerability affecting CPython.

The 
email module didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-11-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945179" comment="libpython3_6m1_0-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945180" comment="python3-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945181" comment="python3-base-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036754.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228924">SUSE bug 1228924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009941062" comment="libtiff5-4.0.9-150000.45.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151317" comment="libtiff5 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7254</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7254" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7254" ref_url="https://www.suse.com/security/cve/CVE-2024-7254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019665.html" source="SUSE-SU"/>
    <description>
    Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-7254/">CVE-2024-7254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230778">SUSE bug 1230778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948329" comment="libprotobuf-lite25_1_0-25.1-150500.12.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009848324" comment="libprotobuf-lite25_1_0 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7264</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036853.html" source="SUSE-SU"/>
    <description>
    libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.

This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228535">SUSE bug 1228535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940478" comment="curl-8.0.1-150400.5.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009940479" comment="libcurl4-8.0.1-150400.5.47.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7409</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7409" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019995.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPDARJICNXP6BQXL6RDWC63AJMWSDEU5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229007">SUSE bug 1229007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951689" comment="qemu-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951576" comment="qemu-accel-tcg-x86-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951577" comment="qemu-arm-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951690" comment="qemu-audio-spice-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951691" comment="qemu-block-curl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951692" comment="qemu-chardev-spice-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951693" comment="qemu-guest-agent-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951694" comment="qemu-hw-display-qxl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951695" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951696" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951697" comment="qemu-hw-usb-redirect-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951457" comment="qemu-ipxe-1.0.0+-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951589" comment="qemu-s390x-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951465" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951466" comment="qemu-sgabios-8-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951698" comment="qemu-tools-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951699" comment="qemu-ui-opengl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951700" comment="qemu-ui-spice-core-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951475" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951594" comment="qemu-x86-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7592</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSUCGYAR5V6CBTVYCRCUUUTW72KK3V55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKDHGTJKHTETAZ6BAHXXRCINJKQVWXGN/" source="SUSE-SU"/>
    <description>
    There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.


When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while parsing the
value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945179" comment="libpython3_6m1_0-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945180" comment="python3-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945181" comment="python3-base-3.6.15-150300.10.72.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8006</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8006" ref_url="https://www.suse.com/security/cve/CVE-2024-8006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019544.html" source="SUSE-SU"/>
    <description>
    Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8006/">CVE-2024-8006 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230034">SUSE bug 1230034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942412" comment="libpcap1-1.10.1-150400.3.3.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8096</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8096" ref_url="https://www.suse.com/security/cve/CVE-2024-8096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036855.html" source="SUSE-SU"/>
    <description>
    When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine.  If the returned status reports another error than 'revoked' (like for example 'unauthorized') it is not treated as a bad certficate.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8096/">CVE-2024-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230093">SUSE bug 1230093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942413" comment="curl-8.0.1-150400.5.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009942414" comment="libcurl4-8.0.1-150400.5.50.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8354</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8354" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8354" ref_url="https://www.suse.com/security/cve/CVE-2024-8354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019995.html" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8354/">CVE-2024-8354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8354">CVE-2024-8354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230834">SUSE bug 1230834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951689" comment="qemu-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951576" comment="qemu-accel-tcg-x86-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951577" comment="qemu-arm-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951690" comment="qemu-audio-spice-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951691" comment="qemu-block-curl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951692" comment="qemu-chardev-spice-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951693" comment="qemu-guest-agent-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951694" comment="qemu-hw-display-qxl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951695" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951696" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951697" comment="qemu-hw-usb-redirect-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951457" comment="qemu-ipxe-1.0.0+-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951589" comment="qemu-s390x-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951465" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951466" comment="qemu-sgabios-8-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951698" comment="qemu-tools-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951699" comment="qemu-ui-opengl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951700" comment="qemu-ui-spice-core-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951475" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951594" comment="qemu-x86-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8443</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8443" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8443" ref_url="https://www.suse.com/security/cve/CVE-2024-8443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFHLYOZRTV2LJKPK5IKLVFJCY2NEU5F/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2024-10-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8443/">CVE-2024-8443 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8443">CVE-2024-8443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230364">SUSE bug 1230364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009944754" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239073" comment="opensc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8612</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8612" ref_url="https://www.suse.com/security/cve/CVE-2024-8612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019995.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPDARJICNXP6BQXL6RDWC63AJMWSDEU5/" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU, in the virtio-scsi, virtio-blk, and virtio-crypto devices. The size for virtqueue_push as set in virtio_scsi_complete_req / virtio_blk_req_complete / virito_crypto_req_complete could be larger than the true size of the data which has been sent to guest. Once virtqueue_push() finally calls dma_memory_unmap to ummap the in_iov, it may call the address_space_write function to write back the data. Some uninitialized data may exist in the bounce.buffer, leading to an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8612/">CVE-2024-8612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8612">CVE-2024-8612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230915">SUSE bug 1230915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951689" comment="qemu-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951576" comment="qemu-accel-tcg-x86-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698020" comment="qemu-accel-tcg-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951577" comment="qemu-arm-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951690" comment="qemu-audio-spice-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951691" comment="qemu-block-curl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951692" comment="qemu-chardev-spice-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951693" comment="qemu-guest-agent-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951694" comment="qemu-hw-display-qxl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951695" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951696" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951697" comment="qemu-hw-usb-redirect-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951457" comment="qemu-ipxe-1.0.0+-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951589" comment="qemu-s390x-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951465" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951466" comment="qemu-sgabios-8-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151116" comment="qemu-sgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951698" comment="qemu-tools-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951699" comment="qemu-ui-opengl-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951700" comment="qemu-ui-spice-core-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951475" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951594" comment="qemu-x86-7.1.0-150500.49.24.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9287</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10779" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000637.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000663.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10979" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10980" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJFBQRJPO2RKRNCFXRZ7LBNZOD2J2TFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14428-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYTLEATTD6AS6C3WNEDFOJPHEPEHGVZC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYTPGEX77JK2ZE34EQ72QVIKUVEAF7IU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOVJMCY4KA267OTEHQVHGXZYG3ZDFHLF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTLWSKEJY5ZQSVBIFJAPHI42KG6XZRAO/" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-02"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950730" comment="libpython3_6m1_0-3.6.15-150300.10.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177173" comment="libpython3_6m1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950731" comment="python3-3.6.15-150300.10.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151916" comment="python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009950732" comment="python3-base-3.6.15-150300.10.75.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151647" comment="python3-base is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9341</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9341" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8112" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8846" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SH4NME65WLYSIYI2S73LD7TJVOL5XNUR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4W2RFBCCEXD7IMZ5BZTZHSWFFZ7ALKG6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231230">SUSE bug 1231230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945839" comment="podman-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945840" comment="podman-docker-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945841" comment="podman-remote-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009945842" comment="podmansh-4.9.5-150500.3.18.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9407</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9407" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8846" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SH4NME65WLYSIYI2S73LD7TJVOL5XNUR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4W2RFBCCEXD7IMZ5BZTZHSWFFZ7ALKG6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231208">SUSE bug 1231208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948306" comment="podman-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948307" comment="podman-docker-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948308" comment="podman-remote-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948309" comment="podmansh-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9675</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8563" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8846" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAOHB23MPYVTOWAWBVXUG2DJFLZAIBD7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BPZKWEB45TSWJ6NPKC7CTIJ2DSDXEQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231499">SUSE bug 1231499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948306" comment="podman-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948307" comment="podman-docker-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948308" comment="podman-remote-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948309" comment="podmansh-4.9.5-150500.3.25.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9676</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10289" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000617.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNUMAPSPUJ4JOCPEUY4VGKUCILGH4O7H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14562-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRGDO26PMNXRU3LV645D4AE5XHP53LSM/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231698">SUSE bug 1231698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231785">SUSE bug 1231785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948454" comment="podman-4.9.5-150500.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948455" comment="podman-docker-4.9.5-150500.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948456" comment="podman-remote-4.9.5-150500.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009948457" comment="podmansh-4.9.5-150500.3.28.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9681</title>
    <affected family="unix">
            <platform>openSUSE Leap Micro 5.5</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9681" ref_url="https://www.suse.com/security/cve/CVE-2024-9681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3927-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020029.html" source="SUSE-SU"/>
    <description>
    When curl is asked to use HSTS, the expiry time for a subdomain might
overwrite a parent domain's cache entry, making it end sooner or later than
otherwise intended.

This affects curl using applications that enable HSTS and use URLs with the
insecure `HTTP://` scheme and perform transfers with hosts like
`x.example.com` as well as `example.com` where the first host is a subdomain
of the second host.

(The HSTS cache either needs to have been populated manually or there needs to
have been previous HTTPS accesses done as the cache needs to have entries for
the domains involved to trigger this problem.)

When `x.example.com` responds with `Strict-Transport-Security:` headers, this
bug can make the subdomain's expiry timeout *bleed over* and get set for the
parent domain `example.com` in curl's HSTS cache.

The result of a triggered bug is that HTTP accesses to `example.com` get
converted to HTTPS for a different period of time than what was asked for by
the origin server. If `example.com` for example stops supporting HTTPS at its
expiry time, curl might then fail to access `http://example.com` until the
(wrongly set) timeout expires. This bug can also expire the parent's entry
*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier
than otherwise intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9681/">CVE-2024-9681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232528">SUSE bug 1232528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap-micro:5.5</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799821" comment="openSUSE Leap Micro 5.5 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951188" comment="curl-8.0.1-150400.5.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009951189" comment="libcurl4-8.0.1-150400.5.56.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878524" version="1" comment="login_defs is &lt;4.8.1-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670997" version="1" comment="login_defs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878526" version="1" comment="shadow is &lt;4.8.1-150500.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166874" version="1" comment="shadow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799821" version="1" comment="openSUSE-release is ==5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803949" version="1" comment="squashfs is &lt;4.6.1-150300.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151752" version="1" comment="squashfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861948" version="1" comment="perl is &lt;5.26.1-150300.17.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151455" version="1" comment="perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861949" version="1" comment="perl-base is &lt;5.26.1-150300.17.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151457" version="1" comment="perl-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872658" version="1" comment="libonig4 is &lt;6.7.0-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714765" version="1" comment="libonig4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803273" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152658" version="1" comment="libssh2-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850771" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850772" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.52.1.150500.6.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851435" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342860" version="1" comment="kernel-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861736" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158152" version="1" comment="libcairo-gobject2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861737" version="1" comment="libcairo2 is &lt;1.16.0-150400.11.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158156" version="1" comment="libcairo2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816011" version="1" comment="docker is &lt;24.0.7_ce-150000.190.4 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808033" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151317" version="1" comment="libtiff5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819898" version="1" comment="kernel-default is &lt;5.14.21-150500.55.44.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819899" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.44.1.150500.6.19.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819610" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869880" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869881" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.68.1.150500.6.31.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865619" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815141" version="1" comment="kernel-firmware-all is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677871" version="1" comment="kernel-firmware-all is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815142" version="1" comment="kernel-firmware-amdgpu is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677872" version="1" comment="kernel-firmware-amdgpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815143" version="1" comment="kernel-firmware-ath10k is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677873" version="1" comment="kernel-firmware-ath10k is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815144" version="1" comment="kernel-firmware-ath11k is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677874" version="1" comment="kernel-firmware-ath11k is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815145" version="1" comment="kernel-firmware-atheros is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677875" version="1" comment="kernel-firmware-atheros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815146" version="1" comment="kernel-firmware-bluetooth is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677876" version="1" comment="kernel-firmware-bluetooth is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815147" version="1" comment="kernel-firmware-bnx2 is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677877" version="1" comment="kernel-firmware-bnx2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815148" version="1" comment="kernel-firmware-brcm is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677878" version="1" comment="kernel-firmware-brcm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815149" version="1" comment="kernel-firmware-chelsio is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677879" version="1" comment="kernel-firmware-chelsio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815150" version="1" comment="kernel-firmware-dpaa2 is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677880" version="1" comment="kernel-firmware-dpaa2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815151" version="1" comment="kernel-firmware-i915 is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677881" version="1" comment="kernel-firmware-i915 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815152" version="1" comment="kernel-firmware-intel is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677882" version="1" comment="kernel-firmware-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815153" version="1" comment="kernel-firmware-iwlwifi is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677883" version="1" comment="kernel-firmware-iwlwifi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815154" version="1" comment="kernel-firmware-liquidio is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677884" version="1" comment="kernel-firmware-liquidio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815155" version="1" comment="kernel-firmware-marvell is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677885" version="1" comment="kernel-firmware-marvell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815156" version="1" comment="kernel-firmware-media is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677886" version="1" comment="kernel-firmware-media is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815157" version="1" comment="kernel-firmware-mediatek is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677887" version="1" comment="kernel-firmware-mediatek is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815158" version="1" comment="kernel-firmware-mellanox is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677888" version="1" comment="kernel-firmware-mellanox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815159" version="1" comment="kernel-firmware-mwifiex is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677889" version="1" comment="kernel-firmware-mwifiex is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815160" version="1" comment="kernel-firmware-network is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677890" version="1" comment="kernel-firmware-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815161" version="1" comment="kernel-firmware-nfp is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677891" version="1" comment="kernel-firmware-nfp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815162" version="1" comment="kernel-firmware-nvidia is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677892" version="1" comment="kernel-firmware-nvidia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815163" version="1" comment="kernel-firmware-platform is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677893" version="1" comment="kernel-firmware-platform is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815164" version="1" comment="kernel-firmware-prestera is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677894" version="1" comment="kernel-firmware-prestera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815165" version="1" comment="kernel-firmware-qcom is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698055" version="1" comment="kernel-firmware-qcom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815166" version="1" comment="kernel-firmware-qlogic is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677895" version="1" comment="kernel-firmware-qlogic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815167" version="1" comment="kernel-firmware-radeon is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677896" version="1" comment="kernel-firmware-radeon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815168" version="1" comment="kernel-firmware-realtek is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677897" version="1" comment="kernel-firmware-realtek is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815169" version="1" comment="kernel-firmware-serial is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677898" version="1" comment="kernel-firmware-serial is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815170" version="1" comment="kernel-firmware-sound is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677899" version="1" comment="kernel-firmware-sound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815171" version="1" comment="kernel-firmware-ti is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677900" version="1" comment="kernel-firmware-ti is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815172" version="1" comment="kernel-firmware-ueagle is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677901" version="1" comment="kernel-firmware-ueagle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815173" version="1" comment="kernel-firmware-usb-network is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677902" version="1" comment="kernel-firmware-usb-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815174" version="1" comment="ucode-amd is &lt;20230724-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167634" version="1" comment="ucode-amd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847049" version="1" comment="kernel-default is &lt;5.14.21-150500.55.49.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847050" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.49.1.150500.6.21.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846396" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859567" version="1" comment="python3-rpm is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231456" version="1" comment="python3-rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859568" version="1" comment="rpm is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151943" version="1" comment="rpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859569" version="1" comment="rpm-ndb is &lt;4.14.3-150400.59.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631126" version="1" comment="rpm-ndb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814273" version="1" comment="qemu is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814247" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698020" version="1" comment="qemu-accel-tcg-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814248" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.9.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814274" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623393" version="1" comment="qemu-audio-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814275" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151106" version="1" comment="qemu-block-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814276" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623395" version="1" comment="qemu-chardev-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814277" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814278" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623396" version="1" comment="qemu-hw-display-qxl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814279" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623397" version="1" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814280" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623399" version="1" comment="qemu-hw-display-virtio-vga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814281" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623401" version="1" comment="qemu-hw-usb-redirect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814185" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814260" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.9.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623404" version="1" comment="qemu-s390x is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814193" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814194" version="1" comment="qemu-sgabios is &lt;8-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151116" version="1" comment="qemu-sgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814282" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814283" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623406" version="1" comment="qemu-ui-opengl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814284" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.9.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623407" version="1" comment="qemu-ui-spice-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814203" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814265" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.9.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945199" version="1" comment="kernel-default is &lt;5.14.21-150500.55.80.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945182" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.80.2.150500.6.35.6 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880171" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880170" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.73.1.150500.6.33.8 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872349" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942305" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858622" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858623" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.59.1.150500.6.25.7 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858175" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861403" version="1" comment="kernel-default is &lt;5.14.21-150500.55.62.2 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861404" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.62.2.150500.6.27.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861193" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879144" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958747" version="1" comment="kernel-default is &lt;5.14.21-150500.55.88.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958516" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.88.1.150500.6.39.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952022" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957800" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817821" version="1" comment="libjbig2 is &lt;2.1-150000.3.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151938" version="1" comment="libjbig2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815623" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942538" version="1" comment="containerd is &lt;1.7.21-150000.117.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153864" version="1" comment="containerd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813861" version="1" comment="runc is &lt;1.1.10-150000.55.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153867" version="1" comment="runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855732" version="1" comment="shim is &lt;15.8-150300.4.20.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152144" version="1" comment="shim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959147" version="1" comment="sysstat is &lt;12.0.2-150000.3.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247516" version="1" comment="sysstat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810448" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303048" version="1" comment="python3-setuptools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849752" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.54.14-150500.11.18.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809873" version="1" comment="kernel-firmware-nvidia-gspx-G06 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849758" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.54.14_k5.14.21_150500.55.49-150500.3.36.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809879" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781703" version="1" comment="supportutils is &lt;3.1.26-150300.7.35.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245545" version="1" comment="supportutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817822" version="1" comment="ppp is &lt;2.4.7-150000.5.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152115" version="1" comment="ppp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851284" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177173" version="1" comment="libpython3_6m1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851285" version="1" comment="python3 is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151916" version="1" comment="python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851286" version="1" comment="python3-base is &lt;3.6.15-150300.10.57.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151647" version="1" comment="python3-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868392" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151616" version="1" comment="gdk-pixbuf-query-loaders is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868393" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151618" version="1" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868394" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-150400.5.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151620" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854018" version="1" comment="less is &lt;590-150400.3.6.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177208" version="1" comment="less is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946419" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946418" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.83.1.150500.6.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946636" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960518" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803593" version="1" comment="qemu is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775441" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775442" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803594" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803595" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803596" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803597" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803598" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803599" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803600" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803601" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775380" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775454" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.6.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775388" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775389" version="1" comment="qemu-sgabios is &lt;8-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803602" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803603" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803604" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775398" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775459" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800974" version="1" comment="kernel-default is &lt;5.14.21-150500.55.31.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800975" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.31.1.150500.6.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799339" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800742" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853099" version="1" comment="qemu is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852955" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852956" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853100" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853101" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853102" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853103" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853104" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853105" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853106" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853107" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852795" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852968" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.12.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852803" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852804" version="1" comment="qemu-sgabios is &lt;8-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853108" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853109" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853110" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852813" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852973" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819387" version="1" comment="libssh-config is &lt;0.9.8-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698027" version="1" comment="libssh-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819388" version="1" comment="libssh4 is &lt;0.9.8-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151772" version="1" comment="libssh4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802096" version="1" comment="suse-module-tools is &lt;15.5.3-150500.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802364" version="1" comment="suse-module-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814969" version="1" comment="kernel-default is &lt;5.14.21-150500.55.39.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814970" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.39.1.150500.6.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815426" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799819" version="1" comment="kernel-default is &lt;5.14.21-150500.55.28.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799820" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.28.1.150500.6.11.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810607" version="1" comment="xen-libs is &lt;4.17.2_08-150500.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151590" version="1" comment="xen-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813076" version="1" comment="libsqlite3-0 is &lt;3.44.0-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153745" version="1" comment="libsqlite3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813077" version="1" comment="sqlite3-tcl is &lt;3.44.0-150000.3.23.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009722601" version="1" comment="sqlite3-tcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808715" version="1" comment="kernel-default is &lt;5.14.21-150500.55.36.1 for aarch64,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808716" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.36.1.150500.6.15.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808496" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791545" version="1" comment="libeconf0 is &lt;0.5.2-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009186986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670995" version="1" comment="libeconf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853332" version="1" comment="ucode-intel is &lt;20240312-150200.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169251" version="1" comment="ucode-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810835" version="1" comment="ucode-intel is &lt;20231114-150200.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857607" version="1" comment="cockpit-wicked is &lt;5~git8.c06c55b-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857608" version="1" comment="cockpit-wicked is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848499" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848500" version="1" comment="python3 is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848501" version="1" comment="python3-base is &lt;3.6.15-150300.10.54.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960019" version="1" comment="dnsmasq is &lt;2.90-150400.16.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152784" version="1" comment="dnsmasq is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852929" version="1" comment="xen-libs is &lt;4.17.3_08-150500.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852276" version="1" comment="login_defs is &lt;4.8.1-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852277" version="1" comment="shadow is &lt;4.8.1-150500.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943081" version="1" comment="python3-dnspython is &lt;1.15.0-150000.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877341" version="1" comment="python3-dnspython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857841" version="1" comment="qemu is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857819" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857820" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.15.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857842" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857843" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857844" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857845" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857846" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857847" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857848" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857849" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857772" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857832" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.15.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857780" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857781" version="1" comment="qemu-sgabios is &lt;8-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857850" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857851" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857852" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857790" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857837" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809081" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;535.129.03-150500.11.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809085" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;535.129.03_k5.14.21_150500.55.31-150500.3.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940343" version="1" comment="kernel-firmware-all is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940344" version="1" comment="kernel-firmware-amdgpu is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940345" version="1" comment="kernel-firmware-ath10k is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940346" version="1" comment="kernel-firmware-ath11k is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940347" version="1" comment="kernel-firmware-atheros is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940348" version="1" comment="kernel-firmware-bluetooth is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940349" version="1" comment="kernel-firmware-bnx2 is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940350" version="1" comment="kernel-firmware-brcm is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940351" version="1" comment="kernel-firmware-chelsio is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940352" version="1" comment="kernel-firmware-dpaa2 is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940353" version="1" comment="kernel-firmware-i915 is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940354" version="1" comment="kernel-firmware-intel is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940355" version="1" comment="kernel-firmware-iwlwifi is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940356" version="1" comment="kernel-firmware-liquidio is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940357" version="1" comment="kernel-firmware-marvell is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940358" version="1" comment="kernel-firmware-media is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940359" version="1" comment="kernel-firmware-mediatek is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940360" version="1" comment="kernel-firmware-mellanox is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940361" version="1" comment="kernel-firmware-mwifiex is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940362" version="1" comment="kernel-firmware-network is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940363" version="1" comment="kernel-firmware-nfp is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940364" version="1" comment="kernel-firmware-nvidia is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940365" version="1" comment="kernel-firmware-platform is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940366" version="1" comment="kernel-firmware-prestera is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940367" version="1" comment="kernel-firmware-qcom is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940368" version="1" comment="kernel-firmware-qlogic is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940369" version="1" comment="kernel-firmware-radeon is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940370" version="1" comment="kernel-firmware-realtek is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940371" version="1" comment="kernel-firmware-serial is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940372" version="1" comment="kernel-firmware-sound is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940373" version="1" comment="kernel-firmware-ti is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940374" version="1" comment="kernel-firmware-ueagle is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940375" version="1" comment="kernel-firmware-usb-network is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940376" version="1" comment="ucode-amd is &lt;20230724-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865820" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797298" version="1" comment="cups-config is &lt;2.2.7-150000.3.51.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177129" version="1" comment="cups-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797299" version="1" comment="libcups2 is &lt;2.2.7-150000.3.51.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177130" version="1" comment="libcups2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848276" version="1" comment="libabsl2308_0_0 is &lt;20230802.1-150400.10.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848319" version="1" comment="libabsl2308_0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848281" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848324" version="1" comment="libprotobuf-lite25_1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809299" version="1" comment="python3-salt is &lt;3006.0-150500.4.24.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009174860" version="1" comment="python3-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809291" version="1" comment="python3-simplejson is &lt;3.17.2-150300.3.4.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809307" version="1" comment="python3-simplejson is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809300" version="1" comment="salt is &lt;3006.0-150500.4.24.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809301" version="1" comment="salt-minion is &lt;3006.0-150500.4.24.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809302" version="1" comment="salt-transactional-update is &lt;3006.0-150500.4.24.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479908" version="1" comment="salt-transactional-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803782" version="1" comment="libvmtools0 is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152857" version="1" comment="libvmtools0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803783" version="1" comment="open-vm-tools is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152858" version="1" comment="open-vm-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801382" version="1" comment="xen-libs is &lt;4.17.2_06-150500.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798971" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153583" version="1" comment="libnghttp2-14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859900" version="1" comment="libsss_certmap0 is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231790" version="1" comment="libsss_certmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859901" version="1" comment="libsss_idmap0 is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859902" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859903" version="1" comment="sssd is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859904" version="1" comment="sssd-common is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632505" version="1" comment="sssd-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859905" version="1" comment="sssd-krb5-common is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859906" version="1" comment="sssd-ldap is &lt;2.5.2-150500.10.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851902" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.41.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852272" version="1" comment="avahi is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151208" version="1" comment="avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852273" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151212" version="1" comment="libavahi-client3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852274" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151214" version="1" comment="libavahi-common3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852275" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151216" version="1" comment="libavahi-core7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810251" version="1" comment="avahi is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810252" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810253" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810254" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814965" version="1" comment="avahi is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814966" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814967" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814968" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.13.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801459" version="1" comment="curl is &lt;8.0.1-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801460" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.32.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801468" version="1" comment="samba-client-libs is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666847" version="1" comment="samba-client-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801463" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801464" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801465" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698019" version="1" comment="python3-libxml2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816615" version="1" comment="tar is &lt;1.34-150000.3.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151391" version="1" comment="tar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794920" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794921" version="1" comment="python3 is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794922" version="1" comment="python3-base is &lt;3.6.15-150300.10.51.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809550" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152931" version="1" comment="libgcc_s1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809551" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152962" version="1" comment="libstdc++6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801458" version="1" comment="opensc is &lt;0.22.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239073" version="1" comment="opensc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851289" version="1" comment="sudo is &lt;1.9.12p1-150500.7.10.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151407" version="1" comment="sudo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940580" version="1" comment="ucode-intel is &lt;20240813-150200.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799872" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151817" version="1" comment="libX11-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799824" version="1" comment="libX11-data is &lt;1.6.5-150000.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151819" version="1" comment="libX11-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799873" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.33.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151821" version="1" comment="libX11-xcb1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800538" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177231" version="1" comment="python3-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813392" version="1" comment="kubevirt-manifests is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624368" version="1" comment="kubevirt-manifests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813401" version="1" comment="kubevirt-virtctl is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624375" version="1" comment="kubevirt-virtctl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802970" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958498" version="1" comment="docker is &lt;26.1.5_ce-150000.212.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868463" version="1" comment="containerd is &lt;1.7.17-150000.111.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810377" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810378" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810379" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814269" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.19.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238038" version="1" comment="haproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862123" version="1" comment="ucode-intel is &lt;20240514-150200.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803402" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802616" version="1" comment="libz1 is &lt;1.2.13-150500.4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153971" version="1" comment="libz1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802617" version="1" comment="zlib-devel is &lt;1.2.13-150500.4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251909" version="1" comment="zlib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946114" version="1" comment="Mesa is &lt;22.3.5-150500.77.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276538" version="1" comment="Mesa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946115" version="1" comment="Mesa-dri is &lt;22.3.5-150500.77.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276542" version="1" comment="Mesa-dri is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946116" version="1" comment="Mesa-gallium is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276548" version="1" comment="Mesa-gallium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946117" version="1" comment="Mesa-libEGL1 is &lt;22.3.5-150500.77.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276551" version="1" comment="Mesa-libEGL1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946118" version="1" comment="Mesa-libGL1 is &lt;22.3.5-150500.77.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276554" version="1" comment="Mesa-libGL1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946119" version="1" comment="Mesa-libglapi0 is &lt;22.3.5-150500.77.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276569" version="1" comment="Mesa-libglapi0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946120" version="1" comment="libgbm1 is &lt;22.3.5-150500.77.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276582" version="1" comment="libgbm1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853557" version="1" comment="libncurses6 is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158858" version="1" comment="libncurses6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853558" version="1" comment="ncurses-utils is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158863" version="1" comment="ncurses-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853559" version="1" comment="terminfo is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158865" version="1" comment="terminfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853560" version="1" comment="terminfo-base is &lt;6.1-150000.5.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158866" version="1" comment="terminfo-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815364" version="1" comment="curl is &lt;8.0.1-150400.5.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815365" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.36.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802976" version="1" comment="libzck1 is &lt;1.1.16-150400.3.7.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803766" version="1" comment="libzck1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812245" version="1" comment="vim-data-common is &lt;9.0.2103-150500.20.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177135" version="1" comment="vim-data-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812852" version="1" comment="vim-small is &lt;9.0.2103-150500.20.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670993" version="1" comment="vim-small is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813366" version="1" comment="traceroute is &lt;2.0.21-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814074" version="1" comment="traceroute is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817485" version="1" comment="xen-libs is &lt;4.17.3_02-150500.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850672" version="1" comment="xen-libs is &lt;4.17.3_06-150500.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877609" version="1" comment="xen-libs is &lt;4.17.4_04-150500.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801466" version="1" comment="grub2 is &lt;2.06-150500.29.8.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801149" version="1" comment="grub2-arm64-efi is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623763" version="1" comment="grub2-arm64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801153" version="1" comment="grub2-i386-pc is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801159" version="1" comment="grub2-s390x-emu is &lt;2.06-150500.29.8.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623767" version="1" comment="grub2-s390x-emu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801162" version="1" comment="grub2-snapper-plugin is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801164" version="1" comment="grub2-x86_64-efi is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801167" version="1" comment="grub2-x86_64-xen is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854719" version="1" comment="vim-data-common is &lt;9.1.0111-150500.20.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854821" version="1" comment="vim-small is &lt;9.1.0111-150500.20.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800217" version="1" comment="glibc is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800218" version="1" comment="glibc-devel is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151370" version="1" comment="glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800219" version="1" comment="glibc-locale is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800220" version="1" comment="glibc-locale-base is &lt;2.31-150300.63.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251612" version="1" comment="glibc-locale-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848194" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817184" version="1" comment="openssh is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152110" version="1" comment="openssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817185" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659235" version="1" comment="openssh-clients is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817186" version="1" comment="openssh-common is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659236" version="1" comment="openssh-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817187" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153169" version="1" comment="openssh-fips is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817188" version="1" comment="openssh-server is &lt;8.4p1-150300.3.27.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659237" version="1" comment="openssh-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813786" version="1" comment="python3-cryptography is &lt;3.3.2-150400.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238251" version="1" comment="python3-cryptography is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844272" version="1" comment="libbluetooth3 is &lt;5.65-150500.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009165954" version="1" comment="libbluetooth3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816335" version="1" comment="libncurses6 is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816336" version="1" comment="ncurses-utils is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816337" version="1" comment="terminfo is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816338" version="1" comment="terminfo-base is &lt;6.1-150000.5.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950235" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231072" version="1" comment="libopenssl-1_1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950236" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177120" version="1" comment="libopenssl1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950237" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231074" version="1" comment="libopenssl1_1-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950238" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.37.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177122" version="1" comment="openssl-1_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848742" version="1" comment="openssh is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848743" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848744" version="1" comment="openssh-common is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848745" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848746" version="1" comment="openssh-server is &lt;8.4p1-150300.3.30.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850152" version="1" comment="wpa_supplicant is &lt;2.10-150500.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152145" version="1" comment="wpa_supplicant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848747" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853566" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151332" version="1" comment="libexpat1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873840" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.65.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873841" version="1" comment="python3 is &lt;3.6.15-150300.10.65.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873842" version="1" comment="python3-base is &lt;3.6.15-150300.10.65.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877772" version="1" comment="libfreebl3 is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151498" version="1" comment="libfreebl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877773" version="1" comment="libsoftokn3 is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151499" version="1" comment="libsoftokn3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877774" version="1" comment="mozilla-nss is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151500" version="1" comment="mozilla-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877775" version="1" comment="mozilla-nss-certs is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151501" version="1" comment="mozilla-nss-certs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877776" version="1" comment="mozilla-nss-tools is &lt;3.101.2-150400.3.48.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151503" version="1" comment="mozilla-nss-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810703" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810704" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810705" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810706" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814270" version="1" comment="gnutls is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814271" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177128" version="1" comment="libgnutls30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814272" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.38.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281488" version="1" comment="libgnutls30-hmac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856057" version="1" comment="opensc is &lt;0.22.0-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941349" version="1" comment="libsystemd0 is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154102" version="1" comment="libsystemd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941350" version="1" comment="libudev1 is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151691" version="1" comment="libudev1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941351" version="1" comment="systemd is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151693" version="1" comment="systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941352" version="1" comment="systemd-container is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239132" version="1" comment="systemd-container is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941353" version="1" comment="systemd-journal-remote is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625973" version="1" comment="systemd-journal-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941354" version="1" comment="systemd-sysvinit is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151697" version="1" comment="systemd-sysvinit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941355" version="1" comment="udev is &lt;249.17-150400.8.43.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151699" version="1" comment="udev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845234" version="1" comment="cpio is &lt;2.13-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151389" version="1" comment="cpio is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942412" version="1" comment="libpcap1 is &lt;1.10.1-150400.3.3.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155212" version="1" comment="libpcap1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865381" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.90.07-150500.11.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865387" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.90.07_k5.14.21_150500.55.65-150500.3.47.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849010" version="1" comment="gnutls is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849011" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849012" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.41.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848195" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848196" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848197" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848198" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858055" version="1" comment="openCryptoki is &lt;3.23.0-150500.3.3.13 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857998" version="1" comment="openCryptoki is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958511" version="1" comment="curl is &lt;8.0.1-150400.5.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958512" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956787" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956788" version="1" comment="python3 is &lt;3.6.15-150300.10.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956789" version="1" comment="python3-base is &lt;3.6.15-150300.10.78.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955258" version="1" comment="qemu-ovmf-x86_64 is &lt;202208-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231460" version="1" comment="qemu-ovmf-x86_64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955261" version="1" comment="qemu-uefi-aarch64 is &lt;202208-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623392" version="1" comment="qemu-uefi-aarch64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853081" version="1" comment="libvirt-client is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151424" version="1" comment="libvirt-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853082" version="1" comment="libvirt-daemon is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151425" version="1" comment="libvirt-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853083" version="1" comment="libvirt-daemon-driver-interface is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151428" version="1" comment="libvirt-daemon-driver-interface is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853084" version="1" comment="libvirt-daemon-driver-network is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151431" version="1" comment="libvirt-daemon-driver-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853085" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151432" version="1" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853086" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151433" version="1" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853087" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151434" version="1" comment="libvirt-daemon-driver-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853088" version="1" comment="libvirt-daemon-driver-secret is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151435" version="1" comment="libvirt-daemon-driver-secret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853089" version="1" comment="libvirt-daemon-driver-storage is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151436" version="1" comment="libvirt-daemon-driver-storage is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853090" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161274" version="1" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853091" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161275" version="1" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853092" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161276" version="1" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853093" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631621" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853094" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161277" version="1" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853095" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161278" version="1" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852745" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.0.0-150500.6.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161279" version="1" comment="libvirt-daemon-driver-storage-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853096" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161280" version="1" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853097" version="1" comment="libvirt-daemon-qemu is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151440" version="1" comment="libvirt-daemon-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853098" version="1" comment="libvirt-libs is &lt;9.0.0-150500.6.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161281" version="1" comment="libvirt-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941061" version="1" comment="docker is &lt;25.0.6_ce-150000.207.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853334" version="1" comment="podman is &lt;4.8.3-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266791" version="1" comment="podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853335" version="1" comment="podman-docker is &lt;4.8.3-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707063" version="1" comment="podman-docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853336" version="1" comment="podman-remote is &lt;4.8.3-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707064" version="1" comment="podman-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853337" version="1" comment="podmansh is &lt;4.8.3-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853422" version="1" comment="podmansh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853567" version="1" comment="curl is &lt;8.0.1-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853568" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868679" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151802" version="1" comment="libarchive13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847023" version="1" comment="runc is &lt;1.1.12-150000.61.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954845" version="1" comment="ucode-intel is &lt;20241112-150200.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854754" version="1" comment="xen-libs is &lt;4.17.4_02-150500.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863244" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253389" version="1" comment="python3-Jinja2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847045" version="1" comment="python3-salt is &lt;3006.0-150500.4.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847046" version="1" comment="salt is &lt;3006.0-150500.4.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847047" version="1" comment="salt-minion is &lt;3006.0-150500.4.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847048" version="1" comment="salt-transactional-update is &lt;3006.0-150500.4.29.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819897" version="1" comment="pam is &lt;1.3.0-150000.6.66.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151504" version="1" comment="pam is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877674" version="1" comment="git is &lt;2.35.3-150300.10.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151600" version="1" comment="git is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877675" version="1" comment="git-core is &lt;2.35.3-150300.10.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151601" version="1" comment="git-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877676" version="1" comment="perl-Git is &lt;2.35.3-150300.10.42.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627143" version="1" comment="perl-Git is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865822" version="1" comment="podman is &lt;4.9.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865823" version="1" comment="podman-docker is &lt;4.9.5-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865824" version="1" comment="podman-remote is &lt;4.9.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865825" version="1" comment="podmansh is &lt;4.9.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848199" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848200" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848201" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862486" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.28.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862487" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.28.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862488" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.28.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862489" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.28.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956595" version="1" comment="helm is &lt;3.16.3-150000.1.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718853" version="1" comment="helm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956596" version="1" comment="helm-bash-completion is &lt;3.16.3-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718854" version="1" comment="helm-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956597" version="1" comment="helm-fish-completion is &lt;3.16.3-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718855" version="1" comment="helm-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956598" version="1" comment="helm-zsh-completion is &lt;3.16.3-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718856" version="1" comment="helm-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853561" version="1" comment="libcares2 is &lt;1.19.1-150000.3.26.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153706" version="1" comment="libcares2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852278" version="1" comment="krb5 is &lt;1.20.1-150500.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151005" version="1" comment="krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853991" version="1" comment="libblkid1 is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151787" version="1" comment="libblkid1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853992" version="1" comment="libfdisk1 is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154114" version="1" comment="libfdisk1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853993" version="1" comment="libmount1 is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151789" version="1" comment="libmount1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853994" version="1" comment="libsmartcols1 is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151791" version="1" comment="libsmartcols1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853995" version="1" comment="libuuid1 is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151793" version="1" comment="libuuid1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853996" version="1" comment="util-linux is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151795" version="1" comment="util-linux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853997" version="1" comment="util-linux-systemd is &lt;2.37.4-150500.9.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151797" version="1" comment="util-linux-systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865581" version="1" comment="skopeo is &lt;1.14.4-150300.11.11.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009265412" version="1" comment="skopeo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853565" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854661" version="1" comment="gnutls is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854662" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854663" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.44.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861081" version="1" comment="tpm2.0-tools is &lt;5.2-150400.6.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615872" version="1" comment="tpm2.0-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861073" version="1" comment="libtss2-esys0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695701" version="1" comment="libtss2-esys0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861074" version="1" comment="libtss2-fapi1 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742552" version="1" comment="libtss2-fapi1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861075" version="1" comment="libtss2-mu0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695702" version="1" comment="libtss2-mu0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861076" version="1" comment="libtss2-rc0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698084" version="1" comment="libtss2-rc0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861077" version="1" comment="libtss2-sys1 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698085" version="1" comment="libtss2-sys1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861078" version="1" comment="libtss2-tcti-device0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742559" version="1" comment="libtss2-tcti-device0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861079" version="1" comment="libtss2-tctildr0 is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742566" version="1" comment="libtss2-tctildr0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861080" version="1" comment="tpm2-0-tss is &lt;3.1.0-150400.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742568" version="1" comment="tpm2-0-tss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855836" version="1" comment="glibc is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855837" version="1" comment="glibc-devel is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855838" version="1" comment="glibc-locale is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855839" version="1" comment="glibc-locale-base is &lt;2.31-150300.74.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862483" version="1" comment="git is &lt;2.35.3-150300.10.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862484" version="1" comment="git-core is &lt;2.35.3-150300.10.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862485" version="1" comment="perl-Git is &lt;2.35.3-150300.10.39.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860372" version="1" comment="less is &lt;590-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870180" version="1" comment="kubevirt-manifests is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870189" version="1" comment="kubevirt-virtctl is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864024" version="1" comment="glibc is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864025" version="1" comment="glibc-devel is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864026" version="1" comment="glibc-locale is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864027" version="1" comment="glibc-locale-base is &lt;2.31-150300.83.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941063" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151144" version="1" comment="glib2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941064" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151145" version="1" comment="libgio-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941065" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151147" version="1" comment="libglib-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941066" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151149" version="1" comment="libgmodule-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941067" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151151" version="1" comment="libgobject-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871391" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871392" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871393" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863423" version="1" comment="python3-requests is &lt;2.25.1-150300.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152097" version="1" comment="python3-requests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865705" version="1" comment="cups-config is &lt;2.2.7-150000.3.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865706" version="1" comment="libcups2 is &lt;2.2.7-150000.3.59.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857793" version="1" comment="python3-idna is &lt;2.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857795" version="1" comment="python3-idna is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865376" version="1" comment="containerized-data-importer-manifests is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624363" version="1" comment="containerized-data-importer-manifests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871535" version="1" comment="krb5 is &lt;1.20.1-150500.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877315" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877663" version="1" comment="liborc-0_4-0 is &lt;0.4.28-150000.3.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877348" version="1" comment="liborc-0_4-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947440" version="1" comment="keepalived is &lt;2.2.2-150500.8.5.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009242242" version="1" comment="keepalived is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958176" version="1" comment="vim-data-common is &lt;9.1.0836-150500.20.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958237" version="1" comment="vim-small is &lt;9.1.0836-150500.20.15.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863551" version="1" comment="gstreamer-plugins-base is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863552" version="1" comment="libgstallocators-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863553" version="1" comment="libgstapp-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863554" version="1" comment="libgstaudio-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863555" version="1" comment="libgstgl-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153892" version="1" comment="libgstgl-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863556" version="1" comment="libgstpbutils-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863557" version="1" comment="libgstriff-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863558" version="1" comment="libgsttag-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863559" version="1" comment="libgstvideo-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940480" version="1" comment="qemu is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940454" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940455" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.18.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940481" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940482" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940483" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940484" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940485" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940486" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940487" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940488" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940280" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940467" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.18.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940288" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940289" version="1" comment="qemu-sgabios is &lt;8-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940489" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940490" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940491" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.18.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940298" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940472" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942539" version="1" comment="runc is &lt;1.1.14-150000.70.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942542" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.22.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944754" version="1" comment="opensc is &lt;0.22.0-150400.3.12.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951996" version="1" comment="xen-libs is &lt;4.17.5_06-150500.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868180" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868181" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868182" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868183" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.31.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953447" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.25.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958510" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151596" version="1" comment="libsoup-2_4-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955219" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955220" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955221" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955222" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955223" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958672" version="1" comment="avahi is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958673" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958674" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958675" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.20.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958009" version="1" comment="socat is &lt;1.8.0.0-150400.14.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152801" version="1" comment="socat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879435" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879436" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879437" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879438" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.34.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871289" version="1" comment="libndp0 is &lt;1.6-150000.3.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154226" version="1" comment="libndp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959155" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945179" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945180" version="1" comment="python3 is &lt;3.6.15-150300.10.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945181" version="1" comment="python3-base is &lt;3.6.15-150300.10.72.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945839" version="1" comment="podman is &lt;4.9.5-150500.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945840" version="1" comment="podman-docker is &lt;4.9.5-150500.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945841" version="1" comment="podman-remote is &lt;4.9.5-150500.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945842" version="1" comment="podmansh is &lt;4.9.5-150500.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881385" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877665" version="1" comment="gtk2-tools is &lt;2.24.33-150400.4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152026" version="1" comment="gtk2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877287" version="1" comment="gtk3-data is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877355" version="1" comment="gtk3-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877309" version="1" comment="gtk3-schema is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877377" version="1" comment="gtk3-schema is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877667" version="1" comment="gtk3-tools is &lt;3.24.34-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877378" version="1" comment="gtk3-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877666" version="1" comment="libgtk-2_0-0 is &lt;2.24.33-150400.4.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152028" version="1" comment="libgtk-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877668" version="1" comment="libgtk-3-0 is &lt;3.24.34-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877380" version="1" comment="libgtk-3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877669" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.24.34-150400.3.9.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877382" version="1" comment="typelib-1_0-Gtk-3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941062" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948329" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940478" version="1" comment="curl is &lt;8.0.1-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940479" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.47.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951689" version="1" comment="qemu is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951576" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951577" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.24.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951690" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951691" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951692" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951693" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951694" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951695" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951696" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951697" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951457" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951589" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.24.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951465" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951466" version="1" comment="qemu-sgabios is &lt;8-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951698" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951699" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951700" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.24.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951475" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951594" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942413" version="1" comment="curl is &lt;8.0.1-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942414" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.50.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950730" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950731" version="1" comment="python3 is &lt;3.6.15-150300.10.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950732" version="1" comment="python3-base is &lt;3.6.15-150300.10.75.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948306" version="1" comment="podman is &lt;4.9.5-150500.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948307" version="1" comment="podman-docker is &lt;4.9.5-150500.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948308" version="1" comment="podman-remote is &lt;4.9.5-150500.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948309" version="1" comment="podmansh is &lt;4.9.5-150500.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948454" version="1" comment="podman is &lt;4.9.5-150500.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948455" version="1" comment="podman-docker is &lt;4.9.5-150500.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948456" version="1" comment="podman-remote is &lt;4.9.5-150500.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948457" version="1" comment="podmansh is &lt;4.9.5-150500.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951188" version="1" comment="curl is &lt;8.0.1-150400.5.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951189" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.56.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227331"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-tcg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia-gspx-G06</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl2308_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite25_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzck1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podmansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5.5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1.150500.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.190.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1.150500.6.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1.150500.6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230724-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1.150500.6.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-150400.59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2.150500.6.35.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1.150500.6.33.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1.150500.6.25.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2.150500.6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1.150500.6.39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.21-150000.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-150000.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-150300.4.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.2-150000.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14-150500.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14_k5.14.21_150500.55.49-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.26-150300.7.35.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-150000.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1.150500.6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1.150500.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5.3-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1.150500.6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1.150500.6.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_08-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1.150500.6.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009186986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240312-150200.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231114-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5~git8.c06c55b-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.90-150400.16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_08-150500.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150000.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03-150500.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03_k5.14.21_150500.55.31-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230724-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230802.1-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-150300.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_06-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150500.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.421.abde31ca5c2-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12p1-150500.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240813-150200.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-150500.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1.5_ce-150000.212.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-150000.111.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240514-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.16-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150500.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150500.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_02-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_06-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_04-150500.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150500.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150500.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150500.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150500.20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150500.20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150400.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.101.2-150400.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150400.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-150500.11.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07_k5.14.21_150500.55.65-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:3.23.0-150500.3.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202208-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.6_ce-150000.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-150000.61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241112-150200.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_02-150500.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.3-150000.1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.3-150000.1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-150500.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-150300.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-150400.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150500.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-150500.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-150500.8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0836-150500.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0836-150500.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-150000.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_06-150500.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.0-150400.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150500.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.56.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
